1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
2 years ago
12

Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor

tant. Where should the data be stored?.
Computers and Technology
1 answer:
tester [92]2 years ago
3 0

Answer:

A developer wants to take existing code written by another person and add some features specific to their needs.

Explanation:

pls Mark as Brain list

You might be interested in
Find an interesting case on the concept of intellectual property
Monica [59]

Answer:

jzsvxysbxydvxhaxabevxusx

5 0
2 years ago
An expression which combines variables numbers and at least one operation
hichkok12 [17]

Answer:

An "Algebraic expression" is the correct answer for the above question.

Explanation:

  • The algebraic expression is an expression that is written in the form of alphabets and numbers. For example x+2x.
  • And it is also calculated with the consideration of alphabets like X+2X will be 3X.
  • The above question asked about the expression which is used with the combination of alphabets or variables and the numbers. That expression is known as "Algebraic expression"
4 0
3 years ago
What is the best low end pc recording software​
julsineya [31]

Explanation:

democreator

D3DGear

nvidia shadow play etc

8 0
2 years ago
Read 2 more answers
Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________
Semenov [28]

Answer:

The offset

Explanation:

In the question, we understand that the original text is HELLO and the encrypted text is OLSSV.

It should be noted that O replaced H, L replaced E, S replaced L and V replacement O.

This is made possible by a term refered to as offset.

The offset is used to determine the character that will replace another when it is encrypted.

7 characters after H is O; this is same for every other characters in the text.

8 0
2 years ago
Which of these categories of computer software can add thousands of dollars to the cost of a computer system?
Radda [10]
Specialized software. hope this helps
6 0
3 years ago
Other questions:
  • The first step in the five-step process for problem solving is to ____. evaluate take action understand the task or need complet
    10·2 answers
  • I'm the state of Florida, your first conviction for DUI can result in your vehicle being impounded for
    5·1 answer
  • Name the hardware component that performs each of the following functions (1) performs calculation and/or comparisons (2) holds
    9·1 answer
  • Web pages often have built-in connections, or links, to other documents, graphics, other web pages, or web sites. true or false?
    9·1 answer
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • In 2d design, form makes what possible?
    15·1 answer
  • Computers and Technology:
    14·1 answer
  • What are the process of boots up a computer?​
    15·2 answers
  • In the following code: function drawCircle(radius, x, y, color) { var circle = new Circle(radius); circle.setPosition(x, y); cir
    7·1 answer
  • 6.23 Lab training: Unit tests to evaluate your program Auto-graded programming assignments may use a Unit test to test small par
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!