1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
3 years ago
13

Explain the uses of computer in police department​

Computers and Technology
2 answers:
shusha [124]3 years ago
5 0

Answer:

Not only can police officers store records and reports in online databases, but they can also use computers and hard drives to store thousands of images, reports and videos. Computers make mass storage possible, and enable giant online databases that can accurately ID suspects anywhere in the country.

Alex3 years ago
5 0

COMPUTER IN POLICE DEPARTMENT

EXPLANATION:

Not only can police officers store records and reports in online databases, but they can also use computers and hard drives to store thousands of images, reports and videos. Computers make mass storage possible, and enable giant online databases that can accurately ID suspects anywhere in the country.

  • <em>HOPE</em><em> </em><em>THIS</em><em> </em><em>WILL</em><em> </em><em>HELP</em><em> </em><em>U</em><em>.</em><em> </em><em>AND</em><em> </em><em>PLZ</em><em> </em><em>MARK</em><em> </em><em>ME</em><em> </em><em>AS</em><em> </em><em>A</em><em> </em><em>BRAINLIEST</em><em>.</em>
You might be interested in
When making an assembly of design what command is most.commonly used?
Schach [20]
There are two common command lines used in creating design assembly. The 'push' and 'pull' command. Both allows you to get parts from the original predelivered content's source desgian    and recreate the design faster and with less memory.
6 0
3 years ago
ZeroIt is a function that takes one argument and returns no value. The argument is a pointer to int. The function stores the val
Sedbober [7]

Answer:

zeroIt(&x);

Explanation:

The statement that sets the value stored in x to zero by invoking the function zerolt is given below

zeroIt(&x);

The zeroIt function is also given below for better understanding.

void zeroIt(int *x) {

   *x = 0;

}

As seen, the function takes an argument with integer variable type, which is a pointer, denoted by the asterisk symbol (*x).

The ampersan sign (&x) is used to access the variable whose value can then be stored.

7 0
3 years ago
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
Which of the items listed is not considered to be personal protective equipment (PPE)?
KatRina [158]

Answer:a

a t t i c

Explanation:

6 0
3 years ago
Assume the variable date has been set to a string value of the form mm/dd/yyyy, for example 09/08/2010. (Actual numbers would ap
bonufazy [111]

Answer:

String date = "21/05/2020";

String dayStr = date.substring(0,2);

int day = Integer.parseInt(dayStr);

System.out.println(day);

Explanation:

Create a variable called <em>date</em> which holds the current date

Create a variable called <em>dayStr</em>. Initialize it to the day part of the <em>date</em> using the substring method

Create a variable called <em>day</em>. Parse the <em>dayStr</em> and assign it to the <em>day</em>

Print the <em>day</em>

6 0
4 years ago
Other questions:
  • Which three of the following are used for mobile Internet access?
    12·2 answers
  • Your friend sends you a computer game. after installing the game on your computer, you realize that it plays very slowly. you kn
    14·1 answer
  • ​ In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review
    5·1 answer
  • What is the disadvantages of using proprietary software
    10·2 answers
  • What is the Intranet?<br>​
    5·1 answer
  • Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
    14·1 answer
  • 1. List three tabs that make up the Ribbon
    14·1 answer
  • Please help!!
    6·1 answer
  • The field that uses technology to manipulate and use information to improve healthcare is known as:_______
    15·1 answer
  • The readline method of bufferedreader returns _____ when end of file is reached.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!