1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
5

Paul wants to store addresses and phone numbers for clients. Paul wants to use this information to send form letters. Paul shoul

d enter the addresses in a _____.
spreadsheet
graphic software
database
word processor
Computers and Technology
1 answer:
dusya [7]3 years ago
5 0

Answer:

Spreadsheet or database depending on how he's setting it up and what tools he's using.

The question makes it sound like Paul wants to store some arbitrary data and does not have any particular tool set up for it, so spreadsheet is probably the "correct" answer.

A database would be used more by developers to build a system that can be used to store such data (e.g. back end on a web site that takes the data).

You might be interested in
My brainly isnt working it isnt showing and answers wats going on? wat do i do
Bas_tet [7]

Answer:

try closing the tab or app and logging back in

Explanation:

7 0
3 years ago
Read 2 more answers
Consider a computer with two processes, H, with high priority, and L, with low priority. The scheduling rules are such that H is
marishachu [46]

Answer:

No

Explanation:

We know that Priority inversion can be seen as a scheduling situation in which higher priority task gets preempted by lower priority task. And that this is one of the main problem in priority scheduling.

If we overlook Priority scheduling and instead we decided to use Round Robin scheduling we will never encounter the priority inversion problem. As ,in Round Robin scheduling the process generally use a certain amount of time or time slices for each processes before it is force to wait for the next process.

3 0
3 years ago
Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language
rosijanka [135]

eh I think yes I think. Maybe

6 0
3 years ago
Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
alexira [117]

Answer:

Alice's public key

Explanation:A Public key is a key that can be used for verifying digital signatures generated using a corresponding private key which must have been sent to the user by the owner of the digital signature.

Public keys are made available to everyone required and they made up of long random numbers.

A digital signature signed with a person's private key can only be verified using the person's private key.

7 0
4 years ago
Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a co
lisabon 2012 [21]

Answer:

Major risks include computer security and maintability of the software and hardware components of the computers in these objects.

I may feel more scared if I was riding a roller coaster that was computer controlled because if there were vunerabilities in the computer's software, a hacker could exploit that and remotely have access to the controls of the roller coaster, putting many people's lives at risk.

I think the benefits of computerizing an increasing number of everyday objects outweigh the potential risks.

This is because computers is very reliable and they do exactly what you tell them to do. However, humans are clumsy and can sometimes be extremely stubborn. Computerizing more everyday objects is an overall good thing for society, however, policies and protocols need to be followed to ensure these computerized objects remain secure.

Explanation:

Hope this helps.

4 0
3 years ago
Other questions:
  • To change the caption for a field in a query, click the field in the design grid, click the ____ button on the Design tab, click
    14·1 answer
  • Write a short java method that takes an integer n and returns the sum of all the odd positive integers less than or equal to n.
    5·1 answer
  • 1. Implement a method factorial(int n), that takes a number (int) and returns its factorial. Factorial of an integer is the prod
    13·1 answer
  • 7-eleven had to file for a bankruptcy. However they become a profit making company after installing an Information System that a
    12·1 answer
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • Can someone please help me on these short short questions marking Brainly computer modeling people please help
    14·1 answer
  • Add criteria to this query to return records where the student lastname field begins with the letter
    13·1 answer
  • Which phrases from the two selections MOST help the reader define the meaning of "captivity"?
    11·2 answers
  • Which three options below describe typographic hierarchy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!