1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
5

Who innovated an aeroplane? ​

Computers and Technology
1 answer:
frutty [35]3 years ago
5 0

Answer:

White brothers!!

Explanation:

You might be interested in
Inherent flaws in system software code are called:
Lana71 [14]
Hiiiiiiiiiiiuiiiiiuuuuuuu
4 0
4 years ago
Database queries is an example of
storchak [24]

Answer:

A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.

SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.

Five types of SQL queries are:

1) Data Definition Language (DDL).

used to define and modify the structure of a database.

2) Data Manipulation Language (DML).

used to manipulate (change) the data in the database.

3) Data Control Language(DCL).

used for access control and permission management for users in the database.

4) Transaction Control Language(TCL).

used for maintaining consistency of the database and for the management of transactions made by the DML commands.

5) Data Query Language (DQL).

used for performing queries on the data within schema objects.

8 0
3 years ago
Compare physical storage and virtual storage. Give an example of each and explain why one type allows computers to access data a
Nuetrik [128]
Physical storage is like your Hard Drive, Virtual is what is called the Cloud. Hard drives are able to pull information directly from inside the computer while the cloud has to do over the internet.
8 0
4 years ago
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
Liula [17]
He should launch an M-commerce app
5 0
2 years ago
Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
amid [387]

Answer:

WHITE HACKERS

Explanation: When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not tell others about it until it has been fixed. In contrast, the black hat will illegally exploit it or tell others how to do so. The gray hat will neither illegally exploit it nor tell others how to do so.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following represent typical account fees?
    7·1 answer
  • By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducti
    15·1 answer
  • This procedure protects against the loss of data
    5·1 answer
  • If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. wh
    10·1 answer
  • Malware that is spread through security warnings or advertisements for antivirus software is known as
    5·1 answer
  • Write the definition of a function printLarger, which has two int parameters and returns nothing. The function prints the larger
    7·1 answer
  • What is Systems Engineering?
    5·1 answer
  • Traditionally, remote administrative access on routers was configured using Telnet on TCP port 23. However, Telnet was developed
    8·1 answer
  • QUESTION 4 PRACTICAL EXERSIZE
    7·1 answer
  • Which of the following is an example of effective nonverbal communication?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!