1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
10

The numeric keys on a keyboard or calculator are referred to as a:

Computers and Technology
1 answer:
Anna [14]3 years ago
6 0

Numeric Keypad is the answer

You might be interested in
Which is a method used to determine database requirement?
Ivahew [28]

Answer:

I think it would be A, good luck!

8 0
3 years ago
A search will _____ determine the index of the goal.
Lapatulllka [165]

Answer:

The correct answer is C. Sometimes.

Explanation:

A database index is a structure that aims to speed up selections and selective operations on a database. An index reduces the number of comparisons required to find one or more database records. This avoids having to perform a so-called full table scan, whereby all records in the table have to be run through sequentially.

Therefore, if the search does not focus correctly on the necessary data, this search will not always determine the index of the goal. Therefore, the user must correctly handle the search keywords to collaborate with the system.

4 0
3 years ago
What is the relationship between CAD and CIM ?
Marat540 [252]
<span> CAM( computerised Aided Manufacture) is when you have workers being helped by computerised tools, CIM (computerised intergated manufacture) is when the whole process is computerised, in manufacture this usually uses robotic arms. These can manufacture 24/7 in needed, they can work very accurately ( they are faster and stronger than a human arm) </span>
5 0
3 years ago
Read 2 more answers
Which of the following is the most important system if a company wants to consolidate fan data from multiple sources, i.e., exte
irina1246 [14]

Answer:

Option B is the correct answer for the above question.

Explanation:

  • The data warehouse is a collection of large data or a database that includes historical and operational or current data. This database can be used to make the decisions for the prospects of the organization.
  • The above question asked about to select the database which can collect the historical and operational data from various source. That type of database is a data warehouse that is described above. Hence option B is correct while the other is not because:-
  1. Option a states about data model which is used to define the database structure.
  2. Option c states about the relational database which is used to collect only current data.
  3. Option d states about the DBMS which is used to manage the relational database.
6 0
3 years ago
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Other questions:
  • Only numbers should go in the columns for Payload Size and Packet Size. The sizes are in bytes. Don't forget to account for the
    7·1 answer
  • What will cloud cumputing offer
    15·1 answer
  • can someone help me write a 5 paragraph essay on microsoft word and why we need and how we use it? if you can please make it sou
    12·1 answer
  • Write a function called countstuff () that takes as a parameter a character array, and returns an int. The prototype must be:
    6·1 answer
  • To filter a list with the Filter function, on an Excel spreadsheet, you need to perform the following steps: (1) click in any ce
    9·1 answer
  • On the classic gameshow The Price Is Right, contestants must guess the price of an object (guesses are distinct). The winner is
    5·1 answer
  • I'd: 9872093250, password: qqqqq, join the meeting​
    11·1 answer
  • Which of the following is NOT a data type in Python?<br> integer<br> decimal<br> string<br> float
    15·1 answer
  • 9. Themes can be modified using variants. *<br><br>True<br>False​
    7·2 answers
  • How is kerning used in Word?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!