1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
2 years ago
6

(e) The vending machine stores the quantity of items available in a database table called ITEMS

Computers and Technology
1 answer:
zimovet [89]2 years ago
8 0

Answer:

a1,a2,62,

please mark brainliest

Explanation:

You might be interested in
Can i get some help please .
Alex787 [66]

Answer:

Interest

So, lets say that you took a loan from the bank of 20,000. But, when you are supposed to pay it back, you need to pay 25,000. This is because of interest. When the bank gives you the money, they cannot give it to you just like that. There is no profit coming from it. So, there is the thing called interest which basically says that since you took money from the bank, you need to pay a little more because you borrowed money from them.

4 0
2 years ago
Read 2 more answers
Which type of photoreceptor is best able to process bright light and color?
Scilla [17]
Cone cells, or cones, are one of three types of photoreceptor cells in the retina of mammalian eyes. They are responsible for color vision and function best in relatively bright light, as opposed to rod cells, which work better in dim light.
4 0
3 years ago
Programs which were typically reserved for college-level classes such as computer animation and CAD programs are now being appli
Irina-Kira [14]
Answer: I think C


Step by step explanation:
8 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
In business documents, spacing between columns needs to be _____. 0.25 inches as little as possible as wide as possible proporti
LenKa [72]
In business documents, spacing between columns needs to be proportional to the text because when spacing between columns, you don't want your text or writing to be too far apart but you want it pretty close/equivalent so the text can be correct.
7 0
3 years ago
Read 2 more answers
Other questions:
  • When an IRET instruction is executed, what actiontakes place?
    5·1 answer
  • A car holds 16 gallons of gasoline and can travel 312 miles before refueling. Write aC++ program that calculates the number of m
    9·1 answer
  • Jennifer recently bought a new computer to type a new manuscript she’s been working on. She also stored a lot of movies on it to
    10·1 answer
  • The term used to describe the shape and layout of a computer component such as a motherboard or hard drive is __ factor?
    14·1 answer
  • Which of the following is a subsystem of computers providing access to the Internet and offering multimedia and linking capabili
    13·1 answer
  • When parallel parking, you should select a space that is __________ as long as your car.
    11·1 answer
  • If I wanted to include a picture of a dog in my document, I could use _____. SmartArt WordArt clip art AutoCorrect
    13·1 answer
  • Explain the impacts of computer in education
    6·2 answers
  • Which elements of text can be changed using automatic formatting? Check all that apply.
    8·1 answer
  • Which pickaxe in minecraft to use?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!