Answer:
Closed Source software programs
NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.
Answer:
NBA bank data is completely destroyed since it has not maintained any backup.
Explanation:
All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.
Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use
Answer:
A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file
Explanation:
A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer
Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format
Structured file are files that are keeps data in a uniform organized structural format
In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.
Answer:
Data administration.
Explanation:
Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.
Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.
the paint 3D program is used for drawing picture true or false
Answer:
The answer is TRUE we use paint program to draw.
Explanation:
#swag
16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.
Answer:
A) A function can hold multiple return statements, but only one return statement executes in one function call
Explanation:
This is because each function can only return one value, whether it be an integer, String, or other object.
However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.
Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.
Hope this helps!
The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.
The following information should be considered:
This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.Therefore, we can conclude that option A is correct.
Learn more about the function here: brainly.com/question/12431044
1. Answer the following questions: a. What are the different types of number system? Name them.
Answer:
binary,decimal, hexadecimal and octal number system
You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem
Answer:
Key escrow.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.
Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.
Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
how do I answer question
Answer:
To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.
Explanation:
Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.
4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,
Answer:
[tex]\sigma_x = 5.68[/tex]
Explanation:
Given
[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]
Required
The standard deviation
First, calculate the mean
[tex]\bar x =\frac{\sum x}{n}[/tex]
So, we have:
[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]
[tex]\bar x = \frac{64}{8}[/tex]
[tex]\bar x = 8[/tex]
The standard deviation is:
[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]
So, we have:
[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]
[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]
[tex]\sigma_x = \sqrt{32.2857}[/tex]
[tex]\sigma_x = 5.68[/tex]
When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequence as the parameters b. must have data types that are compatible with the parameters c. have the same names as the parameters d. all of the above e. a and b only
Answer:
a and b only
Explanation:
If you have a function foo(int a, double b) { } you can call this as foo(x,y), just as long as x is an int and y is a double.
What is a single physical processor? plz help
Answer:
A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.
Explanation:
Which is not true about climatic normals?
Multiple choice question.
A)
They can differ from daily weather conditions.
B)
They are gathered at one location.
C)
They are averaged over a 30-year period.
D)
They describe average conditions.
Answer:
I think c is correct answer
Explanation:
hope it's help yu
Define Data communication
Explanation:
Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses.
which computer is used in hospital for ultrasound?
Answer:
Pentium Powered Computer
Explanation:
Pentium powered computer
who is the father of computer
Answer:
Charles babbage is the father of computer
Explanation:
Charles Babbage is a father of computer
What is the base value of the number system that consist of the digit set {0, 1, 2, 3, 4, 5, 6, 7}?
(a) Two
(b) Eight
(c) Sixteen
(d) Seven
Answer:
B. Eight because octal number system has eight elements
Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)
Select all that apply
A
game designer
B
network engineer
C
graphic designer
D
cashier
Answer:
not d
Explanation:
IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)
Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:
A. Cung cấp nước, dinh dưỡng
B. Giữ cây đứng vững
C. Cung cấp nước, oxy, dinh dưỡng và giữ cây đứng vững
D. Cung cấp nguồn lương thực
Answer:
C
Explanation:
how do you take a screenshot on a Samsung tablet
Explanation:
to capture a screenshot press and hold the power and volume down button at the same time for approximately 2 seconds
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations
Answer:
This is a pretty obvious answer.
An unwanted e-mail sent in bulk from people or organizations.
Explanation:
Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.
Answer:
Use an encryption algorithm
Explanation:
An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.
Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.
why the internet is not policed
Answer:
The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work
write the name of the technologies used in all five generation
Answer:
First Generation (1940-1956)
First Generation (1940-1956)Second Generation (1956-1963)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)
First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)
Answer:
Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .
Explanation:
Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally go up to ______________ feet above airport elevation and the outer ring begins at _______ feet above the ground and extend vertically to _________ feet above airport elevation. (NOTE #1: no commas) (NOTE #2: All values on the Sectional Charts are in MSL values)
Answer:
5 nautical mile
4000 feet
1200 feet
Explanation:
Class C Airspace has inner ring which is also an inner core has usually 5 nautical mile radius. This extends from surface area upto 4000 feet above airport elevation and outer ring starts at an altitude of 1200 feet above ground and is extended upto 4000 feet above airport elevation.
describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation
Answer:
Explanation:
Good organization, complete information and clear writing are the most effective ways to design a document.
I hope this helps
In the early 1900s, engineers introduced the first_____.
What method is used to prevent the random number generator from always starting with the same number?
seed()
random()
randint()
initialize()
Answer:
seed()
Explanation:
Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.
Hope this helps!
Answer:
the answer is seed()
Explanation:
i took the assignment
14. Applying formatting using the commands in the ribbon is called style
(page layout, override, justification)
Answer:
Override
Explanation:
Hope this helps
What is ABC computer?
Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.
Explanation:
With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.
Answer:
They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements
When constructing a project network for a project with 25-100 tasks, a common industry practice is to
utilize the "yellow sticky" approach