1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
2 years ago
5

Pls help me computer science discoveries

Computers and Technology
1 answer:
lara31 [8.8K]2 years ago
3 0

Answer:

jdinwoahdjsioadjsakodsiaohdeioajfnsohfujkdshksyfneowjdfikdjiadjsadhnsuidghaiudbnha

Explanation:

You might be interested in
The ________ tier of the three-tier architecture consists of computers, phones, and other mobile devices that have browsers that
andrey2020 [161]

Answer:

It is the user tier of the 3-tier architecture that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

Explanation:

Almost if not all applications that use e-commerce for operations use the 3-tier architecture.  3-tier architecture is simply the arrangement of server tier which consists of all computers that run a web server and a database tier that consists of computers that run a DBMS to store and retrieve data. We also have the user data that consists of computers, phones, and other mobile devices that have browsers that request and process web pages.

When you make a request, for instance to Google in your local browser, the browser sends a request to the internet. This initial interaction between the user and the internet is what is known as the user tier of the 3 tier architecture. Basically, it is the phase where end users access content online through graphical interface browsers and make requests to the web servers and DBMS.

Learn more about 3-tier architecture

brainly.com/question/12627823

#LearnWithBrainly

6 0
3 years ago
A ____ error occurs when the javascript interpreter encounters a problem while a program is executing.
Leya [2.2K]
It is a runtime error thart occurs when <span>the javascript interpreter encounters a problem while a program is executing.</span>

5 0
3 years ago
If an M:N relationship is mandatory on both sides, and if both relations resulting from the entities involved in the relationshi
vivado [14]

Answer:

0

Explanation:

In the problem above, the relationship that exists between M and N is discovered to be on each side of the system. Furthermore, it was stated that the outcome of the relationship also has approximately 3 records. This shows that there is no record for the bridge that is formed as a result of the relationship.

4 0
3 years ago
If one wanted to use the best method to get storage into long-term memory, one would use _________. maintenance rehearsal rote r
anzhelika [568]

Answer:

elaborative rehearsal

Explanation:

when it comes to storage of information or data into long term memory then elaborative rehearsal plays an important role.

Elaborative rehearsal is a technique which focuses on thinking about the piece of information or data's meaning which is to be stored in long term memory and linking it with the information or data which is already present or stored.

7 0
2 years ago
Step into the year 2028. How are people viewing digital video? Or have we moved on to a completely new format?
WINSTONCH [101]

In the year 2028 I don't believe our digital video viewing experience would change too much considering most, if not all, the population is already satisfied with how easy, simple, and versatile our current experience is. If everything changes one thing will for sure remain unchanged. That one thing is cinemas, I don't think cinemas will ever change much as they provide a constant source of revenue while providing a place for family and friends to get together to watch a movie before it becomes available to other sources.


8 0
3 years ago
Other questions:
  • A(n) ____ is an attack that takes advantage of a system vulnerability.
    7·1 answer
  • The means by which an operating system or any other program interacts with the user is called th
    6·1 answer
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • Write a program that initializes a string variable and prints the first three characters, followed by three periods, and then th
    15·1 answer
  • A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and proc
    10·1 answer
  • Suppose that the bag class is efficiently implemented with a fixed array with a capacity of 4000, as in Chapter 3 of the class t
    8·1 answer
  • Which spreadsheet toolbar displays options such as Cut and Paste?
    11·2 answers
  • Choose the true statement below. (html)
    5·1 answer
  • What is the datapath of add instruction?
    6·1 answer
  • Who is the monst important person and why
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!