1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
9

What data type would you use for a decimal number?* ​

Computers and Technology
1 answer:
Elan Coil [88]3 years ago
3 0

Answer:

numeric

Explanation:

The decimal data type is an exact numeric data type defined by its precision (total number of digits) and scale (number of digits to the right of the decimal point).

I hope this answers your question.

You might be interested in
What limited the possibilities of game development from a technical viewpoint?
lyudmila [28]

Answer:

1)Estimation of the game project

2) Development of Prototype

.

3) Reproduction Stage

4)Communication

5) Polish

Explanation:

The limited the possibilities of game development from a technical viewpoint are the reason why some of developers in gaming are diverting away into another area of computer technology. Some of these limiting factors are;

1):Estimation of the resources needed for the game development which is hard most especially for video games and some of the reasons is that the industry is fast changing. And there are things to be estimated such as time,is there any need bro change the code.

2)Development of Prototype of the game in other to

Know if a feature is valid can be a problematic process.and to know where to perform modifications.

3) Reproduction Stage:

This one of the main limiting problem in almost every game development , and this usually occur when a game ships, reproduction stage is skipped. And without proper preproduction, there will be no coherence in product.

4) Most of the Video games can be easily ruined by bugs and features that is badly executed. And this is where polishing comes in, polishing can be really demanding.

5 0
3 years ago
Describing the technologies used in diffrent generation of computer​
kupik [55]

Windows 98, Windows XP, Windows vista, Windows 7, Windows 8 y Windows 10.

8 0
3 years ago
There are many different types of hardware devices, different manufacturers, and countless configuration possibilities. Explain
erik [133]

Because, they are all required to configure to it to be recognized by an operating system.

Explanation:

It is the Operating System Software that instructs the hardware and puts them together to work well. When the manufacturer does not configure the device to be recognized by an operating system, then it will not work with other components.

Example.

If an Apple machine's sound card is being put in an HP machine which uses Microsoft designed operating system, won't work due to the operating system that the sound card has been designed for.

6 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
What is the scope of AS-26
Ivan

Answer:

is held for use in the production or supply of goods and services or for rentals to others etc

4 0
3 years ago
Other questions:
  • The primary objective of database design is what?
    5·1 answer
  • Why is it important to stand clear and not touch the person while the AED is analyzing or defibrillating?
    11·1 answer
  • Throughout the course we have covered a lot of topics in relation to information systems. Select one or two of the major topics
    14·1 answer
  • Which of these is NOT one of the main parts of an email? A. Header B. Subject C. Body D. Reply
    11·2 answers
  • Define a function below called process_grades. The function takes one argument: a list of integers. Each integer in the list cor
    6·1 answer
  • Which of the following operation is not performed by a mouse 1) left click , middle click , right click, double click​
    15·2 answers
  • What do you expect the future trends of an operating system in terms of (a) cost (b) size (c) multitasking (d) portability (e) s
    12·1 answer
  • Do you ever just . . . . . . . . . . . . .
    5·2 answers
  • Suzanne is following a fad diet. She has started to experience low energy during her workouts, and on a recent trip to the docto
    10·2 answers
  • How do you change a automatic transmission
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!