1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
5

A ____ can be used to enter, display, or edit data

Computers and Technology
1 answer:
Andre45 [30]3 years ago
4 0

Answer:

Database

Explanation:

You might be interested in
____ 59. Suppose that x and y are int variables, ch is a char variable, and the input is: 4 2 A 12 Choose the values of x, y, an
Vlada [557]

Answer:

d. This statement results in input failure.

Explanation:

We are taking input of 3 variables only and those are x,ch,and y. cin is a C++ keyword used take input entered by the user onto the screen cin is not a variable.

The input should of type int char int as written in the code. First is x and character variable ch and then the integer variable y and there should be only three inputs.

8 0
4 years ago
Read 2 more answers
Which delivery model is an example of a cloud computing environment that provides users with a web based email service ?
Evgen [1.6K]

Cloud computing, also known as cloud services, cloud concepts or simply the cloud, is a paradigm that allows to offer computer services. through a network, which is usually the Internet.

(data persistence, authentication, messaging, etc.). for example, a Linux system, a web server, and a programming environment such as Perl or Ruby).

Commercial examples are Google App ,Microsoft Azure,

3 0
3 years ago
Read 2 more answers
What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
Reika [66]
The server should be able to block unauthorized access, a good firewall but still, enable those authorized to have an access. However, there should be security on vulnerable parts of the system that may lead to corruption and easy access to data thieves.
3 0
3 years ago
Why does it say error on that last line of code
wel

Answer:

i have no clue

Explanation:

8 0
3 years ago
Read 2 more answers
10) What is the BEST way to rewrite sentence (1) to make it more
givi [52]
I believe the answer is D. It makes more sense and is the most correct grammatically.

Hope this helped and pls mark as brainliest!

~ Luna
3 0
3 years ago
Read 2 more answers
Other questions:
  • (a)Ms word is a isa word processing software ,(b)hub provides physical connection between all computers, State true or false​
    9·2 answers
  • 2. Fabulously Fit offers memberships for
    9·1 answer
  • You've been hired as a consultant to help an online store owner. You need to complete the implementation of conversion tracking
    5·1 answer
  • What refrigerant has been approved for new household refrigerators and freezers
    14·1 answer
  • There are many different types of documents that are used to convey information in the business world-letters and
    12·1 answer
  • Assign the size of userInput to stringSize. Ex: if userInput is "Hello", output is: Size of userInput: 5
    7·1 answer
  • List five applications field of a computer?​
    8·1 answer
  • Write a program for determining if a year is a leap year. In the Gregorian calendar system you can check if it is a leaper if it
    15·1 answer
  • Three types of keys on the keyboard​
    15·2 answers
  • The tools, skills, knowledge, and machines created and used by humans is known as.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!