1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
spin [16.1K]
3 years ago
9

What data type would you use for a decimal number?* ​

Computers and Technology
1 answer:
Elan Coil [88]3 years ago
3 0

Answer:

numeric

Explanation:

The decimal data type is an exact numeric data type defined by its precision (total number of digits) and scale (number of digits to the right of the decimal point).

I hope this answers your question.

You might be interested in
What is the expected number of jacks-or-better cards in a five-card hand?
UkoKoshka [18]
 A five card hand is drawn from a deck of 52 cards.
One way to do this is to note that the probability  
7 0
4 years ago
If you are trying to create a web page for your band and having difficulty creating links to other groups on your page, what is
Georgia [21]

Answer: Malfunctioning of your hypertext program or malfunctions in your hypertext program.

Explanation: Hypertext is text that contains links to other texts. The HyperMedia is a collective term which can include graphics, video, sounds and texts, hence Hypertext.

The Hypertext also be said to be a special type if database system in which objects like Text, pictures, music, programs etc can be linked to each other creatively such that When you select an object, you can see all the other objects that are linked to it and you can move from one object to another regardless of if they have different forms or not. It was invented by Ted Nelson in the 1960s.

According to the question, when you are trying to create a web page for your band and creating links to other groups on your page, you are probably using the hypertext and if you are having problems doing this, then your hypertext linking is malfunctioning.

7 0
3 years ago
Create a Python script that takes two parameters to do the following:-
tekilochka [14]

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

6 0
3 years ago
There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat
7nadin3 [17]

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


8 0
3 years ago
Read 2 more answers
PLEASE ANSWER CORRECTLY
Bess [88]

Answer:

If you know how many passes you'll be making, a for loop is most suitable.

If you do not know ahead of time, the while loop is better, since the while condition will decide if you're going to make another round.

5 0
3 years ago
Other questions:
  • Match terms in the first column with the order descriptions in column two.
    11·1 answer
  • Can anyone help me with getting bash ubuntu on windows setup?
    15·1 answer
  • What types of input and output devices would be ideal for a college student completing his or her coursework?
    8·1 answer
  • Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a sy
    13·1 answer
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    10·1 answer
  • Calculate the data rate capacity for a 2400 baud signal where there are M=8 levels per symbol. a. 2400 bps b. 4800 bps c. 7200 b
    12·1 answer
  • The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe wha
    10·1 answer
  • The Klez virus was a worm created to "spoof others. What is "spoofing"?
    6·1 answer
  • Which of the following events happened first
    15·2 answers
  • From few sometime I am unable to answer any question. Whenever I am clicking on Answer button it is taking me to logging page. B
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!