1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
2 years ago
6

Cottonisagoodreflectorofsound​

Computers and Technology
2 answers:
Mars2501 [29]2 years ago
5 0

Answer:

mhmm

Explanation:

Kitty [74]2 years ago
3 0
Answer Stop it makes me horn y
You might be interested in
a user has a large amount of data that she or he needs to store. the data will not be accessed regularly, but still needs to be
Flura [38]
You need a sd card so you can store it and use it later
6 0
3 years ago
Read 2 more answers
Help pls. Computer basics.
telo118 [61]
Text boxes and related tools
8 0
3 years ago
Read 2 more answers
You complete your database, and the company begins using it. Shortly afterwards, two GearUp buyers, Cora and Owen, work together
Olegator [25]

Answer: Multi-user issue

Explanation: A database management system scheme can have multi-user issue when the designing of the system is not made properly. The multi user issue rises when the users concurrently access the data from the database and related error get invoked due to some reason like  repeatable reading issue, serialization, etc.

The reading problem is usually can be related to reading of the database in  uncommitted manner, uncommitted reading, repeatedly reading etc.Thus, Cora and Owen are accessing the database concurrently which can create multi-user issue.

3 0
3 years ago
A computer emergency response team is called at midnight to investigate a case in which a mail server was restarted. After an in
ANEK [815]

<u>Answer</u>:   B. Identify the source of the active connection

<em>Any problem can be fixed only finding of the source of it. We can fix a problem in ‘n’ number of ways but it might again come back if source of it is not identified.</em>

<u>Explanation:</u>

Identify the source of the active connection is the NEXT step the team should take. It is very similar to our human body.

If the infection is coming in the body again and again and gets fixed in the treatment, the reason for come - back will be identified so that it does not <em>lead to unnecessary treatment. </em>

In a similar way, if source are identified then the problem of come-back can be avoided. <em>So option B would be the right choice.</em>

4 0
3 years ago
Robots are increasingly being used in caring roles. Discuss the ethical and cultural implications of this trend
vekshin1
Using more robots means less human contact which means declining social skills, and heavier dependence on technology. And using more technology is expensive.
4 0
3 years ago
Other questions:
  • Which layer of the osi model defines functions related to data delivery, error recovery, and flow control?
    8·1 answer
  • HELP 10 POINTS AND BRAINLIEST FOR BEST ANSWER! EASY I PROMISE! HELPFUL ANSWERS ONLY PLEASE HURRY!
    14·2 answers
  • Which of the following is an example of a formal business standard
    14·2 answers
  • Choose two browsers and compare their security features.
    5·1 answer
  • Choose all the answers that apply.
    15·1 answer
  • Which network component blocks status?
    9·1 answer
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    6·1 answer
  • Name:
    13·1 answer
  • What to do if you click on a phishing link on iphone
    9·2 answers
  • The international system of units is very important to our worldwide science community because it is easier for scientists to sh
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!