1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
9

Discuss data and its types from computer programming and data analysis prospectively?​

Computers and Technology
1 answer:
Hoochie [10]3 years ago
3 0

Answer:

With the use of data and their types the extent of how much data can be stored can get insanely large. types like doubles and longs allow for a range of values nearly incomprehensible in their size for storing user information, web pages, games ect. Using them essentially allows you to plan for the future of the size of whatever you're creating. On top of that, it allows for a preciseness not typically able to be reached without these types.

You might be interested in
What is the Multiple Items tool?
Dmitry_Shevchenko [17]

Explanation:

when a form is created in Microsoft Access using the form tool it displays a single record at a time.To display multiple records and the form should be more customizable then in this case we use Multiple Items tool.

Creating a form using Multiple Items Tool:-

In navigation pane click query or table which contains the data that we want to see on the form.

On create tab,in the group Forms,click more Forms,then click Multiple Items.

6 0
3 years ago
Which of the following CANNOT incorporate animation
Anarel [89]
Lost the following …
8 0
2 years ago
Which is an example of an binary number?
Liula [17]
The second one
01111
This is because a computer uses binary and only understands two digits which consit of 1 and 0
8 0
3 years ago
Read 2 more answers
Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
Akimi4 [234]

Answer:

True

Explanation:

As employees might be accessing business/client data, security of data access is a topmost priority.

8 0
3 years ago
Git pull is a combination of which 2 other git commands?.
Kobotan [32]

Answer:

git fetch followed by git merge

Explanation:

8 0
3 years ago
Other questions:
  • Write thanks to the IT teacher at the end of grade 5
    7·1 answer
  • Which of the following statements is true of intrapreneurs
    15·1 answer
  • in a management information system, the quality of information is determined by its usefulness to users, and its usefulness dete
    8·1 answer
  • To color the h2 heading, what tag would you use?
    6·1 answer
  • PLEASE HELP I WILL GIVE YOU BRAINLILY
    15·2 answers
  • Explain the function of different flags in the 8086<br>​
    12·1 answer
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Explain how data structures and algorithms are useful to the use of computer in data management<br>​
    10·1 answer
  • tell us things u did as a kid but don't want to admit to it (best gets brainly 5 stasr and a thank you)
    13·2 answers
  • Computer spreadsheet is a grid of​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!