1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ludmilka [50]
3 years ago
10

Emails, Documents, Videos and Audios are examples of- (a) Structured data (b) Unstructured data (c) Semi-structured data (d) Non

e of these
Computers and Technology
1 answer:
mariarad [96]3 years ago
6 0

Answer:

A

Explanation:

because if you have videos, audios and documentation you can easily see that this has structure and good explainations.

You might be interested in
Computer engineering is a career that......
WITCHER [35]

Answer:

Computer engineering is a career that works on the development and research of new technology-related things.

Explanation:

4 0
3 years ago
What are QBASIC Operators ?​
Anna35 [415]

Answer: There are four types of operators in QBASIC. They are Arithmetic Operators, Relational Operators, Logical Operators and Sting Operator. a. Arithmetic Operators. Arithmetic Operators are used to perform mathematical calculations like addition, subtraction, division, multiplication and exponential. :)

5 0
4 years ago
Read 2 more answers
what are some steps Hector could have taken to ensure that his photographs were not ruined near the end of the shoot?
galben [10]

Answer:

make several extra copies of the pictures and frame them right away if they're printed out.

Explanation:

3 0
2 years ago
1. Write a method to measure sortedness of an array. The method header is:
Licemer1 [7]
ㄴㄱㄷㅂㄷㅈ븟ㅈㅂㅈㅂㅈㄱㅅㄱㅈㅂㄷㅅㄷㅈㄱㅅㄱㅅㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅈㅂㅈㅂㅈㄱㅈㄴㅈㄴㄱㅆㅅㄱㅈㅂㄷㅅㅈㅂㅈㅅㄱ싲ㄱㅈㅂㄷㅂㅅㅇㄱㅇㄱㅅㅂㄷㅈㄱㅇㄱㅇㄱㄷㄱㅅㄱㅇㄱㄷㅈㄱㅇㅈㄱㅂㅈㅂㄷㅇㄷㅅㅆㄱㅇㄱㅅㅈㄱㅈㄱㅇㄱㅇㅂㅇㄱㅁㄱㅇㄱㅇㄱㅇㄱㅇㄱㅁㅋㅁㄱㅇㄱㅇㄱㅇㄱㄴㅁㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅇㄴㅁㄴㅇㄴㅇㄴㅅㄱㅈㄱㅈㅅ?...
7 0
3 years ago
Physical security controls traditionally include obstacles, alarms, lights, guards, cameras, and responders that produce a(n) __
Lostsunrise [7]

Answer:

secure facility

Explanation:

7 0
3 years ago
Other questions:
  • Why is RAM used for temporary storage!
    6·1 answer
  • Which osi model layer manages data encryption?
    14·1 answer
  • Before entering a road from an alley or driveway, you must:Flash your high beam headlights 
    13·1 answer
  • What is the output of the following program segment? int main() { int num = 5; cout << num <<" "; change(num); cout
    8·1 answer
  • To use the Report Wizard to create a report for a query, select the query in the Navigation Pane, click ____ on the ribbon, and
    13·1 answer
  • Ted is looking for a reliable source for his paper. Which of the following sites would be considered reliable?
    5·1 answer
  • Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
    5·1 answer
  • Programming a computer to win at chess
    7·2 answers
  • Write an algorithm and flowchart to display H.C.F and L.C.M of given to numbers.​
    9·1 answer
  • I just tested how resistant my skin is with a multimeter and I stuck the probe tips pretty hard into my left and right hand. The
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!