1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
7

What are some good apps to download to screenshot your screen?

Computers and Technology
1 answer:
LenaWriter [7]3 years ago
7 0

Answer:

AZ Screen Recorder.

Firefox ScreenshotGo Beta.

Screenshot Touch.

Screen Master.

Most personal assistant apps

You might be interested in
You need to design a data storage scheme for Hayseed Heaven library data system. There are several hundred thousand large data r
Alekssandra [29.7K]

Answer:

Make use of hash tables

Explanation:

The appropriate thing to use for this should be a hash table.

A Hash Table can be described as a data structure which stores data in an associative manner. In a hash table, data is stored in an array format, where each data value has its own unique index value. Access of data becomes very fast if we know the index of the desired data. So we can perform Hashing on ISBN Number since its unique and based on the Hash Function w ecan store the Information record.

There is no requirement for printing the file in order - HashTables dont store the data in order of insertions, so no problems with that

It becomes a data structure in which insertion and search operations are very fast irrespective of the size of the data. So Querying books details can be fast and searching will take less time.

It can also be pointed out that it wont be too expensive for Hardware implemtation as HashTables stores data based on Hash Functions and memory consumption is also optimal which reduces memory wastages.

7 0
3 years ago
The ____ command can be used to view the contents of a record when it is anticipated that the record will need to be modified. I
GREYUIT [131]

Answer:

The correct answer is B)

Explanation:

The commit command allows us to:

• Consolidate, confirm

• committing refers to the idea of confirming a set of provisional changes permanently.

• A popular use is at the end of a database transaction.

•

The LOCK TABLE command should be used:

• when a lock of the mode specified in the table can be acquired.

• The command will wait for everything you need to get the lock,

• In case you cannot acquire the lock immediately, the NOWAIT option is specified so that the command cancels the transaction.

6 0
3 years ago
How many times do you need to click the format painter button to apply copy formats to multiple paragraphs one right after the o
IRISSAK [1]
U have to double-click for multiple paragraphs instead of single click

5 0
3 years ago
What is a general term for a type of database which is endlessly and easily scalable without a measurable performance decrease
Andrews [41]

Answer:

<u>Scalable database</u>

Explanation:

Good examples of a scalable database include; NoSQL database, MySQL, Microsoft SQL.

<em>Remember</em>, these databases are called scalable databases because they support memory expansion without a measurable performance decrease.

For example, if the management of a hotel notices that its 1 terabyte computer used to store its security videos is no longer adequate to meet the hotel's expansion, then decide to buy a newer server that can be integrated into the current system. We can say they just applied the concept of scalable databases.

4 0
3 years ago
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
Other questions:
  • Jamie has to enter names, grades, and scores of a group of students into a worksheet. Which option will Jamie use to describe th
    11·1 answer
  • What is malware short for?
    13·2 answers
  • Plz help ( which is an example of a good URL?
    10·2 answers
  • How do most database users perform data searches?
    6·1 answer
  • How do I do a PowerPoint
    10·2 answers
  • Omar wants to know how his organization has been doing financially over the last year. He wants to also compare this information
    5·2 answers
  • What landforms are likely to form at this boundary
    15·1 answer
  • Bro i swear whenever i play fortnite duos, they ask you if you don't have a mic, if you don't then they just leave, so annoying
    15·2 answers
  • How to convert meters to centimeters in c programming​
    8·1 answer
  • WILL GIVE BRAINLIEST!! 20 PNTS!!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!