1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
4 years ago
5

A database is helpful when you have large amounts of information that you wish to

Computers and Technology
1 answer:
vodomira [7]4 years ago
4 0
Lets see, database contains a large portion of information in one area. While you can edit and send information. These are generally used to organize the data inside.
You might be interested in
________ errors may indicate that an attacker is trying to send invalid data to the server. 404 303 500 512
Lemur [1.5K]
<span>500 errors may indicate that an attacker is trying to send invalid data to the server. </span>
5 0
4 years ago
please write out an accurate code for the question below also please explain or I'll report you ( Thanks :) )
leva [86]

Answer: hmmmm i feel like u have to move the thingy thats shooting that light down 1 unit so it can move the planet.

Explanation: moving it down 1 unit will put it at the perfect angle to push the planet. :/

6 0
2 years ago
Read 2 more answers
Match the data type to their correct explanations,
sergejj [24]

Answer:

I'm positive memo is "allows inserting a large amount of text including numbers" i just took the test on Plato and got everything wrong but that one

4 0
3 years ago
Read 2 more answers
Which best describes TPM?
rodikova [14]

Answer:

Encryption used on hard drives

Explanation:

TPM is a hardware chip. It is a type of module that is used to authenticate the hardware devices with the help of encryption keys (passwords). It is the short form of Trusted Platform module. The hardware devices that be authenticated through this module may include personnel computer or laptops. There are different keys, password and security codes.

So, the best sentence that describes, TPM is Encryption built into hardware .

4 0
3 years ago
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
4 years ago
Other questions:
  • If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standa
    14·1 answer
  • Hannah had been a newspaper carrier for four years. Each year she delivered more papers then the year before. The first year she
    13·1 answer
  • Which group on the Home Ribbon contains the line spacing attribute?
    9·2 answers
  • How does heat affect quantum computers ?
    10·1 answer
  • What does ieee stand for
    14·2 answers
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • While using a word processor to create a project report, Ashley includes the subject, title, and the author's name in the report
    7·1 answer
  • Write a recursive method that returns the number of 1’s in the binary representation of N. Use the fact that this is equal to th
    9·1 answer
  • What is unique about the TODAY and NOW functions?
    15·2 answers
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!