1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
2 years ago
7

What is the advantage of entering metadata for electronic records that you create

Computers and Technology
1 answer:
dexar [7]2 years ago
8 0

Answer:

allows users to locate and evaluate data without each person having to discover it anew with every use.

Explanation:

here you go hope it helps!

You might be interested in
How would you create a loop that never ends?
34kurt

Answer:

the answer is d use the forever block

Explanation:

I took the test and I got it right but sometimes it is different for others

8 0
3 years ago
Describe how MICR is used to read these details from the cheque​
KatRina [158]

Answer:

A MICR device reading the magnetic ink on a cheque. (the ink contains iron particles). This special ink is used to write customer account numbers on the bottom of cheques. The MICR device reads the account numbers then converts it to a form the computer can understand.

Explanation:

A MICR device reading the magnetic ink on a cheque. (the ink contains iron particles). This special ink is used to write customer account numbers on the bottom of cheques. The MICR device reads the account numbers then converts it to a form the computer can understand.

7 0
3 years ago
What will happen if more than 2 devices attempt to access the internet ?
Lemur [1.5K]
Well it depends what kind of Internet u have
5 0
3 years ago
What does the following expression evaluate to?: "2 + 8"
lozanna [386]
10 tell me if I’m wrong
7 0
3 years ago
Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch
Elis [28]

Answer:

The answer to this question as follows:

Explanation:

Whois database system and the nslookup software tool:

In each organization, the IP addresses can be identified by a hacker, that uses the whois database system and the nslookup software tool to attack certain IP addresses during most of the attack.

Whois databases system:

The Whois database systems must be made public because they're the key guide when finding a domain respondent or IP address chain.

6 0
4 years ago
Other questions:
  • What can you do to stop a computer from repeatedly restarting in a continuous loop?
    13·1 answer
  • The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the netw
    6·1 answer
  • Write a program that asks the user to enter the amount s/he has budgeted for a month. The amount should be between 1000 and 2000
    11·1 answer
  • VLSI is the process of creating an integrated circuit (IC) by combing thousands of transistors into a single chip. There are two
    5·1 answer
  • What three things in the third generation of computing helped get programming enthusiasts more involved with computers? Select 3
    12·2 answers
  • Imagine that a crime has been committed and being a police officer you have to investigate the case. Solving a crime can be a ve
    12·1 answer
  • IMPORTANT HELP
    8·1 answer
  • Who is credited with writing Google's famous page ranking search algorithm?
    13·1 answer
  • You can use tables for layout work. However, in XHTML, each form control should have its own ______ element
    12·1 answer
  • How do you code to find the surface area 6 s2, volume s3 in python
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!