1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
14

Rupali is creating a database of all of the clients who request custom artwork. Each client will be considered one item in the d

atabase. What will Rupali need to create for each client?
file

column

table

record
Computers and Technology
2 answers:
Evgen [1.6K]3 years ago
7 0
Data helperrrrrrrrrrrrrr
Tju [1.3M]3 years ago
5 0

Answer: Rupali needs to create a Column for each client.

You might be interested in
Given two 2x3 (2 rows, 3 columns) arrays of integer , x1 and x2, both already initialized , two integer variables , i and j, and
Gnesinka [82]
JAVA programming was employed...

What we have so far:
* Two 2x3 (2 rows and 3 columns) arrays. x1[i][j] (first 2x3 array) and x2[i][j] (second 2x3 array) .
* Let i = row and j = coulumn.
* A boolean vaiable, x1rules

Solution:

for(int i=0; i<2; i++)
{
   for(int j=0; j<3; j++)
   {
      x1[i][j] = num.nextInt();
   }
}// End of Array 1, x1.

for(int i=0; i<2; i++)
{
   for(int j=0; j<3; j++)
   {
      x2[i][j] = num.nextInt();
   }
}//End of Array 2, x2
This should check if all the elements in x1 is greater than x2:

x1rules = false;
if(x1[0][0]>x2[0][0] && x1[0][1]>x2[0][1] && x1[0][2]>x2[0][2] && x1[1][0]>x2[1][0] && x1[1][1]>x2[1][1] && x1[1][2]>x2[1][2])
{
   x1rules = true;
   system.out.print(x1rules);
}
else
{
   system.out.print(x1rules);
}//Conditional Statement
7 0
3 years ago
Ethernet ensures that _____ on a shared network never interfere with each other and become unreadable.
Dmitry [639]

Answer:

Signals.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Ethernet ensures that signals on a shared network never interfere with each other and become unreadable through the use of encapsulation and standard encryption protocols.

In Computer Networking, encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).

The TCP/IP model comprises of four (4) layers;

1. Application layer: this is the fourth layer of the TCP/IP model. Here, the data unit is encapsulated into segments and sent to the transport layer.

2. Transport layer (layer 3): it receives the segment and encapsulates it into packets and sends to the internet layer.

3. Internet layer (layer 2): packets are encapsulated into frames.

4. Network layer (layer 1): frames are then converted into bits and sent across the network (LAN).

Hence, the data unit encapsulated inside a packet is known as segment, which is typically referred to as packet segmentation.

Additionally, these data, segments, packets, frames and bits transmitted across various layers are known as protocol data units (PDUs).

8 0
2 years ago
Discuss advantages and disadvantages of os
Serhud [2]

Answer:

Advantages :

Management of hardware and software

easy to use with GUI

Convenient and easy to use different applications on the system.

Disadvantages:

They are expensive to buy

There can be technical issues which can ruin the task

Data can be lost if not saved properly

Explanation:

Operating system is a software which manages the computer. It efficiently manages the timelines and data stored on it is considered as safe by placing passwords. There are various advantages and disadvantages of the system. It is dependent on the user how he uses the software.

5 0
3 years ago
Below, we’ve provided a for loop that sums all the elements of list1. Write code that accomplishes the same task, but instead us
Tanzania [10]

Answer:

Explanation:

The code that would best accomplish this task using a while loop would be the following:

list1 = [8, 3, 4, 5, 6, 7, 9]

accum = 0

n = 0

while n < 7:

        accum += list1[n]

        n += 1

This code will continue throughout the list1 array and add every value to the accum variable.

5 0
3 years ago
The process of determining that a computer program implements a simulation model as it is intended is known as
DIA [1.3K]
<span>the process of determining if a computer program implements a simulation model as it is intended is known as verification.</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • Graphic design has evolved rapidly in recent years with the advancement of digital technology. Discuss how the evolution of grap
    8·1 answer
  • Which two approaches optimize test maintenance and support future declarative configuration changes? Choose 2 answers Create a m
    8·1 answer
  • The largest group of Linux users is likely to be
    7·1 answer
  • PLEASE HELP THIS WAS DUE YESTERDAY AND I DIDN'T GET TO IT IN TIME!!!!!!
    8·1 answer
  • A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
    14·1 answer
  • Where is the BIOS stored?<br><br> CPU<br> CMOS<br> RAM<br> Northbridge
    13·2 answers
  • Why was the tesla model s help change the was we see EV
    12·1 answer
  • (e) The vending machine stores the quantity of items available in a database table called ITEMS
    6·1 answer
  • You find a picture of a famous department store online that would be great to include in a project of yours. What should you do
    7·1 answer
  • The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The co
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!