1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
10

What maintains data about various types of objects, events, people, and places?

Computers and Technology
1 answer:
Whitepunk [10]3 years ago
5 0
Database,A data made management system,data element,
You might be interested in
When are numbered lists generally used
tatuchka [14]

C. When listing items that have an order of priority.

Explanation:

There are a lot of ways to list items such as alphabets and Roman numerals.

And the all have their respective reasons.

When numbering in order of priority, it is more appropriate to use numbers instead of alphabets and Roman numerals.

8 0
3 years ago
g Write a program that reads a list of words, and a character. The output of the program is every word in the list of words that
lord [1]

Answer:

Here you go, alter this as you see fit :)

Explanation:

array = []

cnt = 0

while cnt < 11:

   x = input("Enter a word: ")

   array.append(x)

   cnt += 1

   y = input("Add another word?(Y/n):  ")

   if y.lower() == "n":

       break

letter = input("\nChoose a letter: ")

if len(letter) != 1:

   print("Error: too many characters")

   quit()

for n in range(len(array)):

   if letter.lower() in array[n].lower():

       print(array[n], end= ",")

4 0
3 years ago
In Microsoft word you can access the blank command from the mini toolbar
Softa [21]
Your answer would be:
<span>
In Microsoft Word you can access the </span><span>insert citation command from the mini toolbar.</span>
3 0
4 years ago
Analyse how the reduction in size and the profitability of computer have influence their usage​
Olin [163]

HOPE ITS HELP

IN THE PICTURE

6 0
2 years ago
How is a worm different from a Trojan?
olga_2 [115]

Answer:

C. A worm spread through a network, whereas a trojan hides inside another program.

Explanation:

Worms spread through computer networks, a great example of a popular computer worm that struck the world is the "ILOVEYOU" / "Love Letter for You" worm. The malware infected over ten million personal computers and was spread via the user's email and sent to all addresses in the user's address book.

A trojan virus is essentially a piece of malicious software that looks legitimate from the outside but in under the seal it's highly malicious and destructive; hence how it got it's name "Trojan Horse" which is a reference to an Ancient Greek story of deception.

8 0
3 years ago
Other questions:
  • What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
    13·1 answer
  • A written guarantee to fix or replace an item is called a _____.
    5·2 answers
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    7·2 answers
  • For each recursive call, display the outputs on a separate line and add a level of indentation. do your utmost to make the outpu
    10·1 answer
  • Give your definition of a stored procedure. Based on the Academic Database, identify and describe a scenario where it would be n
    12·1 answer
  • Which search strategy explores nodes from the initial state as well as the goal state?
    10·2 answers
  • Question 18
    11·1 answer
  • tomaso is explaining to a colleague the different types dns attacks. which dns attack would only impact a single user?
    5·1 answer
  • ___1. my1st JavaProgram<br> A. valid <br> B. invalid
    13·1 answer
  • NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for li
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!