Answer:
customer IDs
phone numbers
social security numbers
Explanation:
A primary key may be defined as the special choice of the attributes which uniquely specify tuple in the relation. It is the set of columns where values uniquely identify each of the rows in the table.
It is use to find the unique record form the table or database. It is the key in the relational database which is unique for each record. It can be a unique number such as identification number, vehicle number, etc.
In the context, the primary keys which is used for the customers in a departmental store database are :
-- customer IDs
-- phone numbers
-- social security number
All these are unique set of number and they are the primary keys for a customer as they are uniquely identifies a particular customer. No other person is given the same phone number or phone number.
Which technology concept uses computer resources from multiple locations to solve a common problem?
Answer: Sounds like you are talking about “Distributed memory systems” which use multiple computers to solve a common problem, with computation distributed among the connected computers (nodes) and using message-passing to communicate between the nodes.
Which of the following sentences use personification 
A. The stars in the sky are bright
B. The tree had leaves of green, yellow, and brown,
C. The truck pulled the heavy trailer out of the mud.
D. The snowflakes danced through the air.
Answer:
D
Explanation:
snowflakes cant dance.Its a human things.
What is plagiarism? Suppose you are an online store owner & you caught someone copying your store items and selling them at a lower price. What will you do? Keep in mind that your business in ONLINE
Answer:
Plagiarism is the reproduction of someone's Idea, language , work or expressions like one's original idea , language, work or expression. and not giving acknowledgment to the owner of the Idea, language, work or expression.
when someone copies your store Items and sell them at lower price the best course of action is keep your business ideas and product secrets close to yourself because you cannot have a monopoly of the market since it is an online business
Explanation:
Plagiarism is the reproduction of someone's Idea, language , work or expressions like one's original idea , language, work or expression. and not giving acknowledgment to the owner of the Idea, language, work or expression.
when someone copies your store Items and sell them at lower price the best course of action is keep your business ideas and product secrets close to yourself next time, because you cannot have a monopoly of the market since it is an online business hence there will be no action
Can someone help me plz
Answer:
ok but on what tho
Explanation:
plz explain yourself
Edhesive Intro to cs quiz 2 q#9
What is output?
Print (3 % 15)
Thanks!!
Answer:
5
Explanation:
AS we know that % is the sign of division in C language when we divide the 3 into 15 its 5
Answer:
5
Explanation:
What are the benefits of writing functions that use parameters and return? Try to list at least two.
Answer:
Explanation:
Writing functions that use parameters and return helps improve code readability and manages complexity by reusing code.
By repeating code and creating methods that utilize arguments and return, you may increase readability of code and control complexity. Instead of creating two distinct functions, parameters may be used to mix the two.
Parameters and results of the tests enable us to build code that is more readable and adaptable to a wider range of contexts. However, we'll need to practice reading, developing, and troubleshooting code like this because it operates a little more than the programmed we're used to.
Learn more:
https://brainly.com/question/15260986?referrer=searchResults
Which type of cryptography uses two mathematically linked keys, one key encrypting the data and the other decrypting the data?
Asymmetric
Encoding
Firewall
Symmetric
Answer:
Asymmetric.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
There are two (2) main types of encryption techniques used in cryptography and these are;
I. Symmetric encryption.
II. Asymmetric encryption.
Asymmetric encryption is a type of cryptography which uses two mathematically linked keys, one key encrypting the data and the other decrypting the data. These two keys are generally referred to as a public key and a private key respectively.
This ultimately implies that, a pair of key (two keys) that are different in values is required or needed to make a computer system secured.
A pizza delivery restaurant decides to stop hiring drivers and start hiring cyclers to deliver its pizza. The restaurant thinks this will cut costs because it will not have to pay for gas. This is an example of which of the following supply chain management drivers?
A. information
B. facilities
C. transportation
D. inventory
Answer:
C. i think im sorry if im wrong plz forgive
which category does this fall in identity theft
Answer:
A crime.
Explanation:
It's illegal.
A shop has a sale that offers 40% off all prices.
On the final day they reduce all the sale prices by 20%.
Linz buys a radio on the final day.
Work out the overall percentage reduction on the price of the radio.
Answer: 52%
Explanation:
First they reduced the prices by 40% so now the prices are 60% of their original price.
They then reduced it by a further 20%.
= 20% * 60%
= 12%
Total reduction = 40% + 12%
= 52%
Which of the following does not represent the function of a Variable? Variables store data in memory; this data has limited use throughout a program.
Variables are used to store information that is referenced and manipulated in a computer program.
Variables provide a way of labeling data with a descriptive name
Variables are containers that hold information.
Answer:
Variables store data in memory; this data has limited use throughout a program.
Explanation:
In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information which can be modified or edited.
Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.
Some of the function of a Variable includes;
I. Variables are used to store information that is referenced and manipulated in a computer program.
II. Variables provide a way of labeling data with a descriptive name. This helps to make programming codes to be clear and easy to understand for everyone.
III. Variables are containers that hold information.
Generally, variables are essential in writing codes because they are used to label and logically store data in contiguous memory locations.
Hence, variables store data in memory; this data can be used throughout the program i.e they do not have limited use throughout a program.
While in the Current View command group for notes, which view options do you have available? Check all that apply.
Answer: A, B, C (is this for a Microsoft class?)
Explanation: Edge
Answer:
Icon
Note list
Last 7 days
Explanation:
Which of these lines of code will increment a variable?
A.
print(variable)
B.
count(variable)
C.
inc(variable)
D.
variable = variable + 1
Answer:
D
Explanation:
Answer:
D.
Explanation:
I got it right on the test.
When you open your word-processing program, it opens in a
field
menu
Answer:
B
Explanation:
Which of the following is a legal variable name?
A) O temperatureAM
B) 52
C) 1test
D) #data
Answer:
D #data
Explanation:
A) O temperatureAM is a legal variable name.
What does the “MIN” and “MAX” functions allow you to do when inserted in a spreadsheet?
Answer:
Please see explanation
Explanation:
A spreadsheet is used to make calculations and payrolls etc. Different functions are used in spreadsheet. Two of them are MIN and MAX.
The MIN function gives the minimum value out of all the cells in the range.
It is written as:
= MIN(number1, number2..)
OR
= MIN(Starting_cell_address:Last_cell_address)
Similarly, MAX function gives the maximum value from the selected range of cells.
= MAX(number1, number2..)
OR
= MAX(Starting_cell_address:Last_cell_address)
Sean is considering a career in construction but is worried about job security. Which of the following arguments might help convince him to
enter the construction industry? (Select all that apply.)
Because it is site specific, construction work is impossible to outsource.
Even when the economy is poor, demand for building maintenance remains high.
The educational requirements vary depending on the specific construction job.
Construction work varies by season, but all workers have come to expect this.
Answer:
Because it is site specific, construction work is impossible to outsource.
Even when the economy is poor, demand for building maintenance remains high.
Construction work varies by season, but all workers have come to expect this.
Explanation:
Answer:
Even when the economy is poor, demand for building maintenance remains high.
Because it is site specific, construction work is impossible to outsource.
Explanation:
In 5-10 sentences, describe the procedure for responding to an e-mail message.
Answer: See explanation
Explanation:
The procedure fur responding to an email message goes thus:
The first thing to do is to open the website of the email. Then, you would click on "compose".
When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.
Then you type the content of your message. When you're done with this, then you click on send.
Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a
loop to control different elements on a screen?
Answer:
The search bars in search engines to find the most reliable information.
Explanation:
What is typeface
A. A family of fonts in a certain style
B. The spacing between individual letters
C. The tapered feature at the end of strokes
D. The logo and tagline that represent a company
E. The spacing between lines in a paragraph
Answer:
the answer is A - family of fonts.
Explanation:
plato/edmentum users! i got it correct on the test.
What value will the color variable have after these lines of code run?
Answer:
red
Explanation:
color is set to red in the last line of being defined.
Fill in the blank with the correct term.
A _____ sort starts by comparing the first item in the list to the remaining items, and swaps where the first item is greater than the later item.
Then it compares the second item in the list to the rest.
This continues until it compares the second last item to the last item.
Int[] myArray1= new int[24]; int[] myArray2= new int[10]; float[] myArray3= new float[8]; int index1, index =0 for(int index1 =0; index1<24; index1++){ myArray1[inex1]=index1*2; index2=index1%10; index3=index1%8; myArray2[index2] = index3 + index 2 + myArray1[index1]; myArray3[index23 = myArray1[index2] + index3;
Answer:
The value of myArray2[index2] when index1 = 12 is 30
Explanation:
In the source code, the formula for myArray2[index2] is;
myArray2[index2] = index2 + index3 + myArray1[index1],
myArray1[index1] = index1 * 2,
index2 = index % 10 (equal to the remainder) and
index3 = index % 8
When index1 increases to 12 in the for-loop statement, the "myArray1[index1]" is equal to 24, index2 is equal to 2 and index3 is 4. The total sum is equal to 30 and assigned to "myArray2[index2]".
Edhesive 6.7 code practice
What does the following line of code do? Assume the user enters 2.3.
answerA = input("Enter a number. ")
It stores an int in the variable.
It stores a string in the variable.
It stores a float in the variable.
This line of code causes an error.
Answer:
It stores an int in the variable.
Explanation:
Answer:
It will store an int (Integer) into the variable.
Explanation:
Edg 2021
stay safe and search answers up if you need
Answer:
Yes, Thank you
Jesus loves you!!
Explanation:
Taking a recipe and breaking it down into its individual sections, like ingredients, preparation, cooking instructions, and nutritional information, is an example of _____.
refinement
pattern recognition
decomposition
abstraction
Answer:
its C - Decomposition
Explanation:
100% edge
Fruits and vegetables lose some of their vitamins and phytonutrients, which are healthy plant molecules other than vitamins and minerals. The amount of nutrients destroyed increases with cooking time and temperature. Some nutrients can even start to be lost during food preparation. Thus, option C is correct.
What cooking instructions, include decomposition?Boiling results in the greatest loss of nutrients, while other cooking methods more effectively preserve the nutrient content of food. When it comes to preserving nutrients, stir-frying, roasting, and steaming are some of the best ways to prepare vegetables.
There are three different sorts of cooking techniques: combination cooking, moist heat cooking, and dry heat cooking. Heat is used in each of these techniques to modify food uniquely. These three ways can be used to categorize all forms of cooking, including grilling and steaming.
Therefore, taking a recipe and breaking it down into its individual sections, like ingredients, preparation, cooking instructions, and nutritional information, is an example of (decomposition).
Learn more about cooking here:
https://brainly.com/question/5190639
#SPJ2
Explain the applications software that you use everyday
Answer:
Game software e.g PES, Star wars
PLZ HELP
Alejandro decided to save some time by copying and pasting code into the editor, but the program didn’t work. What is the most likely explanation for this?
A.
There was no binary converter.
B.
Interpreters can’t read symbols from a different font.
C.
There was no code editor available.
D.
There was an error in the original code.
Answer:
B needed points but its right
;)
Explanation:
A professional interpreter's job is to make it possible for two or more parties who speak different languages to communicate with one another. Because of this, qualified interpreters are limited to translating spoken words. Thus, option B is correct.
What Interpreters can’t read symbols from a different font?Their responsibilities include accompanying clients on trips to help them communicate with others who speak different languages, translating speeches or presentations for audiences that are multilingual, and assisting with the conversion of spoken words into written communications.
Add > Symbol > Additional Symbols. Select the symbol in the resulting window, but also double-check that the font is set to your usual font on the line at the upper left. After that, type your shortcut. The symbol ought to display in the specified font when you use the shortcut.
Therefore, Interpreters can’t read symbols from a different font.
Learn more about font here:
https://brainly.com/question/7971447
#SPJ2
The terms Apps and Applications can be used interchangeably about software installed
on both computers and mobile devices. True or False
Answer:
False
Explanation:
Hope this helps and have a great day!!!!