1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
4 years ago
10

The computer stores a program while the program is running, as well as the data thatthe program is working with, in __________.

Computers and Technology
1 answer:
Elena-2011 [213]4 years ago
3 0
<span>While you are working with a document using a program such as wordpad, the document is stored in .exe file</span>
You might be interested in
Database management systems are expected to handle binary relationships but not unary and ternary relationships.'
alekssr [168]

Answer:

False          

Database management systems are expected to handle binary, unary and ternary relationships.

Explanation:

Unary Relationship: It is a recursive relationship which includes one entity in a relationship which means that there is a relationship between the instances of the same entity. Primary key and foreign key are both the same here. For example a Person is married to only one Person. In this example there is a one-to-one relationship between the same entity i.e. Person.

Binary Relationships: It is a relationship involving two different entities.   These two entities identified using two relations and another relation to show relationship between two entities and this relation holds primary keys of both entities and its own primary key is the combination of primary keys of the both relations of the two entities. For example Many Students can read a Book and many Books can be obtained by a Student.

Ternary Relationships: is a relationship involving three entities and can have three tables. For example a Supplier can supply a specific Part of many Mobiles. Or many Suppliers may supply several Parts of many Mobile models.

6 0
3 years ago
Which of the following is not a good use of a spreadsheet?
Ivanshal [37]
I’d say business letter
4 0
3 years ago
The IV tubing and hub connection site should be left free of tape and uncovered from the dressing so that it can be visually ins
ra1l [238]

Answer:

True

Explanation:

Based on the information provided within the question it can be said that this statement is completely True. The IV tubing and hub need to be easily accessible and able to be visually inspected at all times since all liquids, including medicine enter the patients body through the IV line. Therefore any blockage or error can be life threatening and the problem in the tubing or hub need to be detected immediately and solved, which is why all IV equipment is transparent.

3 0
3 years ago
When you perform an in-place upgrade to windows 8.1 from windows 7, what will be names of the “windows” folders in windows 7 and
juin [17]
THIS PC. 

HOPE THIS HELPS
3 0
4 years ago
Which of the following is not a scene mode?
tatiyna
I believe the answer is C) Model.
7 0
4 years ago
Read 2 more answers
Other questions:
  • Which part of the os provides users and applications with an interface to manipulate files?
    8·1 answer
  • Which EMC product provides a solution for block-level storage virtualization and data mobility?
    7·1 answer
  • What are some of the challenges of note-taking? Check all that apply.
    7·2 answers
  • Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l
    14·1 answer
  • Technology experts in the area of _____ specialize in technology for competitive advantage. a. process design b. hardware strate
    13·1 answer
  • With a DUI charge on a driver’s record ______________.
    10·1 answer
  • Which one way in which using infrared in game console controllers could affect the experience of a person playing the game?
    8·1 answer
  • How does computer science play a role in art?
    6·1 answer
  • Differentiate between a software package and integrated software and why users would choose one over the other.
    11·1 answer
  • Consider a k=8 block cipher.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!