1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
14

I NEED A BIG BRAIN BOYO TO HELP ME

Computers and Technology
1 answer:
dlinn [17]3 years ago
7 0
Yoooo whattt?? I don’t get this but idek
You might be interested in
________ databases are better than relational databases at handling unstructured data such as audio clips, video clips, and pict
timofeeve [1]

Answer:

"Object-oriented" would be the correct choice.

Explanation:

  • An object-oriented database seems to be a database that subscribes to a framework containing object-depicted details. Throughout the context of the relational database management system, object-oriented is a unique product that is not as popular and most well-known as traditional web applications.
  • This indicates that internet connectivity to existing records has to implement the previously defined connections for interacting components established by that same containers.
3 0
3 years ago
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
2 years ago
C++ a. Write a program that uses the function isPalindrome given in example 6-6 (Palindrome). Test your program on the followinn
Whitepunk [10]

Answer:

#include <iostream>

#include <array>

using namespace std;

bool isPalindrome(string str)  

{  

int length = str.length();  

for (int i = 0; i < length / 2; i++)  

 if (toupper(str[i]) != toupper(str[length - 1 - i]))

  return false;  

return true;  

}

int main()

{

array<string, 6> tests = { "madam", "abba", "22", "67876", "444244", "trymEuemYRT" };

for (auto test : tests) {

 cout << test << " is " << (isPalindrome(test) ? "" : "NOT ") << "a palindrome.\n";

}

}

Explanation:

The toupper() addition forces characters to uppercase, thereby making the comparison case insensitive.

5 0
3 years ago
Help ME! Will Mark BRAINLIEST! Its Engineering!
Anettt [7]
What is it about ? And what you need help on
5 0
3 years ago
NEED TO KNOW ASAP FOR A PROJECT
german
If you have an iPhone, you can use iMovie
6 0
3 years ago
Read 2 more answers
Other questions:
  • How to make a sad face on keyboard using alt?
    5·2 answers
  • When creating an input/ output table, where do you enter the formula?
    5·1 answer
  • Instructions:Type the correct answer in the box. Spell all words correctly.
    14·2 answers
  • Which player type focuses on level progression?
    13·1 answer
  • As a safe driver, you cannot, __________
    13·1 answer
  • What process periodically validates a user’s account, access control, and membership role on inclusion in a specific group?a. Re
    12·1 answer
  • Explain why a document created by word processing software is stored as a binary file.​
    14·1 answer
  • Which of the following best describes professional behavior in the IT field?
    11·2 answers
  • The function below takes two arguments: a string (name) and an integer (position). Complete the function so that it prints out t
    7·1 answer
  • __________ is a computer tool for evaluating the risk of exposure to wildfires.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!