1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
2 years ago
5

HELP URGENT

Computers and Technology
1 answer:
arsen [322]2 years ago
5 0

Answer:

D. It is a program that checks for grammatical errors.

You might be interested in
A(n) _____ is a flexible tool used to analyze data using reports that do not have a predetermined format.
Mandarinka [93]

Answer:

decision support system

Explanation:

4 0
3 years ago
To ensure rapid recovery and security of data, backup data should be ________.
Nataly [62]

Answer:B kept at a secure location at the facility

Explanation:

8 0
3 years ago
Create pseudocode to compute the volume of a sphere. Use the formula: V= (4/3)* π r3 where π is equal to 3.1416 approximately, w
MA_775_DIABLO [31]

Answer:

In geometry, the area enclosed by a circle of radius r is πr2. Here the Greek letter π represents a constant, approximately equal to 3.14159, which is equal to the ratio of the circumference of any circle to its diameter.

Explanation:

3 0
3 years ago
Read 2 more answers
Database management systems are expected to handle binary relationships but not unary and ternary relationships.'
alekssr [168]

Answer:

False          

Database management systems are expected to handle binary, unary and ternary relationships.

Explanation:

Unary Relationship: It is a recursive relationship which includes one entity in a relationship which means that there is a relationship between the instances of the same entity. Primary key and foreign key are both the same here. For example a Person is married to only one Person. In this example there is a one-to-one relationship between the same entity i.e. Person.

Binary Relationships: It is a relationship involving two different entities.   These two entities identified using two relations and another relation to show relationship between two entities and this relation holds primary keys of both entities and its own primary key is the combination of primary keys of the both relations of the two entities. For example Many Students can read a Book and many Books can be obtained by a Student.

Ternary Relationships: is a relationship involving three entities and can have three tables. For example a Supplier can supply a specific Part of many Mobiles. Or many Suppliers may supply several Parts of many Mobile models.

6 0
3 years ago
Write a Python program that calculates the product of all odd numbers between 1 and 1111, using the for loop and the range funct
Verdich [7]

Answer:

answer = 1

for i in range(1, 1111, 2):

   answer *= i

print(answer)

Explanation:

The result is: 1867661487583158519937007997593731768674710592395936453814589179168970488627486922435352153202170177468180449036460330489883227953920786805094193880129176242750706494757506292242513096874889912138041641434433821228611320718319399459865627764413363015842622109227229695987391658459583021203370153652674793604946843921588657975214048903891877905278158326695472816452229608456097609116519045810867129060580585147954461081838126748579250596173066031868654116793938302170110362754673884690241925481893823673916009076351110558645412222773118927086453253674705050538434792606852567079575854841390964177213252754015145265445261542957834970632574543428225247242488955307645556148572185949820791464992259236192606284766174288372574869081003838416637821295590820946372288692264397746175279884156247638880688731656093911498376399334121390341627286952705811600644061948275361728751637451512725082376969150560038940786375629981515779279396085386198351152320090978588430101676704229895114350886499131456005886390334346220238579530541662198038029084029447261270224035584412162390327122500762501298502491940263477106501424307313102108306951120296510397274150253596249878157904612419169854362011297315737418348969961989528582716326033338095891309343771263480361729925724962879195879868448756011080612327885089033870698092857432512937836751109257833022671357201287794589267907954829015862301288301132960212133783812669550047024479011437136932727298699319362640380859375

7 0
3 years ago
Other questions:
  • The stack ADT may be implemented with
    13·1 answer
  • The analysis of how people relate to each other is known as?
    6·1 answer
  • The ___________________ command is used to establish connectivity.
    14·1 answer
  • Why is it important to recognize web adress endings ?
    13·1 answer
  • Create detailed pseudocode for a program that calculates how many days are left until Christmas, when given as an input how many
    15·1 answer
  • In what way do media and networks interact? A.) Media are connected to networks tat make information easier to share. B.) Networ
    8·1 answer
  • The function of an audio mixer is to _____. layer audio tracks at their ideal volume combine, control, and route audio signals f
    6·1 answer
  • An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
    15·1 answer
  • When using a small mic that attaches to your interview subject, where should you place that mic and why?
    5·1 answer
  • Write a program that reads and unspecified number of integers, determines how many positive and negative values have been read,
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!