1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexandra [31]
3 years ago
9

The table below describes the planting method used for some vegetables. Which field in this table can you define as the primary

key?
Sr. No.
Name
Planting method
Planting time
Computers and Technology
2 answers:
Serjik [45]3 years ago
7 0

Answer:

The vegetables should be named by it's specific name and it's planting method should be written down as well as the time it was planted. The Sr. No. should be there so the person can tell the difference between each plant.

Explanation:

Katena32 [7]3 years ago
6 0
The answer is NOT PLANTING TIME or NAME if that helps.
You might be interested in
Write a script that will read from a file x and y data points in thefollowing format:
worty [1.4K]

Answer /Explanation

load hw92.dat

FID = fopen(file, 'r');

if FID == -1  

   fprintf('ERROR CANNOT OPEN FILE TO READ!');  

else

   fclose(file);

The we have:

datacell = textscan(FID, 'x%fy%f', 'CollectData', 1);

xycoords = datacell{1};

x 0 y 1

x 1.3 y 2.2

x 2.2 y 6

x 3.4 y 7.4

x 4.2 y 5.5

x 4.4 y 4.5

x 6.2 y 7.8

x 7.7 y 11.1

x 8.2 y 11.5

x 9.9 y 15.2

x 7.2 y 9.5

x 8.9 y 12.5

end

8 0
3 years ago
Which term refers to the technical structure of the software, how users interact with the software, and how the software is phys
mars1129 [50]
The Answer is <span> Architecture</span>
7 0
3 years ago
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
Goryan [66]

Answer:

The correct answer to the following question will be "Digital Forensics".

Explanation:

  • Digital forensics is a field of forensics that involves the analysis and retrieval of materials found in electronic devices, sometimes related to cybercrime.
  • The objective of digital forensics methodologies would be to check, maintain and evaluate evidence on computing systems to find possible evidence for a trial. In the initial days of computing, an individual investigator could process files because the power consumption was so small.

Therefore, Digital Forensic is the right answer.

7 0
4 years ago
why when I click apostrophe I get an accent mark? And when I try quotation marks I get this ( ¨ ) how do I change that or why is
faltersainse [42]

Answer: it's probably how your computer is set up . I would try going into settings and seeing if you can fix it

Explanation:

5 0
4 years ago
Which of the following is an extension of the fill pattern Sunday,Tuesday?
Maru [420]
The answer to your question is Thursday, Saturday, Monday.
7 0
3 years ago
Other questions:
  • The ListIterator interface
    13·1 answer
  • You have a workstation running windows vista business that you would like to upgrade to windows 7 ultimate. you want to perform
    11·1 answer
  • Write a single statement that will print the message "first is " followed by the value of first, and then a space, followed by "
    9·1 answer
  • The 'parseInt' method of the 'Integer' class throws a 'NumberFormatException' when it is passed a String argument that it cannot
    11·1 answer
  • The Internet has made going global easier than it has ever been, but the promise of "borderless commerce" remains restrained bec
    12·1 answer
  • People think that they can send email messages from their personal computers and that it cannot be traced. This is called the __
    13·1 answer
  • Describe the facility that allows multiple types of operating systems to run in a virtualized environment with varying types of
    15·1 answer
  • Java Programming
    14·1 answer
  • How is net pay different from gross pay?
    11·1 answer
  • On the new iOS version, can you save photos from ‘review confirmed photos’? If so, how? Thanks!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!