1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
4 years ago
15

What is most likely kept in a database

Computers and Technology
1 answer:
givi [52]4 years ago
5 0
Sales reports, Employee records,bank statements,logged passwords
You might be interested in
The most basic software required for an online course where writing is involved is:
Andrej [43]
The annswer is word processing.
7 0
3 years ago
Choose the words that make the following sentence true.<br> Primary memory is
ki77a [65]

Answer:

Primary memory is computer memory that is accessed directly by the CPU

Explanation:

8 0
3 years ago
What is the highest numeral in a binary code?
Anarel [89]

Answer:

The highest numeral in binary code is 1

In binary, you can only have 1s and 0s

if you're asking for the biggest number that can be represented, it's 255, which is 11111111. (this is 8 1s)

Explanation:

Is this a trick question? lol

May I have brainliest please? :)

5 0
3 years ago
Using the functions from problems 1 and 2, write a MATLAB script to compare the laminar results from to the turbulent results. C
suter [353]

To start combining, select the Merge Mode option on the Comparison tab. Next, click the button next to the line you wish to merge in order to replace content from the right pane with content from the left pane.

<h3>How is boundary layer thickness calculated?</h3>
  • Where x is a position parallel to the wall, y is a coordinate normal to the wall, v is a (small) viscosity, u = (u, v) is the velocity, is the vorticity, and so on. The boundary conditions are as follows: u(x,y = +,t) = U, and u(x,y = 0,t) = 0.
  • To gauge the overall pressure, a vertically sliding Pitot tube is employed. So that the growth of the boundary layer in the flow direction can be seen, the total pressures can be recorded at various distances from the plate surface. Static pressure is gauged at a different measurement location.
  • To start combining, select the Merge Mode option on the Comparison tab. Next, click the button next to the line you wish to merge in order to replace content from the right pane with content from the left pane. Alternatively, you can pick a discrepancy and choose Replace Content from the Comparison tab.        

To learn more about Boundary conditions refer to:

brainly.com/question/23802083

#SPJ4

6 0
1 year ago
Electronic components in coputers process data using instructions, which are the steps that tell the computer how to perform a p
Dominik [7]

Answer:

True

Explanation:

  • True, the electronic components perform the tasks that are given to the computer.
  • The computer is made up of nothing but the electronic components like Transistors, Circuits etc.  
  • Electronic components are the building blocks of the computer.
  • So essentially all the tasks performed by the computer are actually performed by the electronic components inside it.
  • So it can be understood that the tasks that are given to the computer are performed by the electronic components. They perform the tasks with the instructions given to the computer.  
  • There also special electronic components designed to read, write and perform the tasks given to the computers.
  • The electronic components comprise of the circuits, transistors, resistors and capacitors.
3 0
3 years ago
Other questions:
  • Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
    10·1 answer
  • Which of the following is a reason why the comments tool within PDF documents could be helpful? (Select all that apply.)
    5·1 answer
  • What piece of software tells the operating system how to use a specific hardware device?
    14·1 answer
  • Question 5 (10 points)
    12·1 answer
  • Drive-by hacking is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network serv
    5·1 answer
  • It is important to name your files in a variety of formats. true or false
    15·2 answers
  • An example of an asset is:<br><br> A. Time<br> B. Money<br> C. A Car <br> D. All of the above
    5·2 answers
  • QUESTION 16
    14·1 answer
  • If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
    10·1 answer
  • You can put ______ on your phone.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!