Databases, including e-mail servers, are often arranged to provide___


answer quick plz

Answers

Answer 1

Answer:

Storage

Explanation:


Related Questions

Corrine is doing online research about polar bears. One Web site she finds is wwwdefendersorg. What is the likely primary goal of this Web site?
A. to persuade or change the thinking or actions of others

B. to sell a product

C. to provide clear, balanced, and unbiased information about the topic

D. to entertain the viewer

Answers

Answer:

C

Explanation:

This should be right

cccccccccccccccccccc Explanation:

Ok for whoever answers this, Ill wager 20 points...
Consider the following procedures.

PROCEDURE math (ans1, ans2)
{
a ← INPUT()
b ← INPUT()
c ← math2(a, b)
e ← a + ans1
f ← b + ans2
g ← math2(e, f)
h ← c + g
DISPLAY(h)
}

PROCEDURE math2 (res1, res2)
{
d ← res1 + res2
RETURN(d)
}
What is displayed as a result of executing the following program, if when prompted, the user enters a = 3 and b = 4?

math(1, 2)

Answers

Answer:

The display will be 17.

Explanation:

Tracing through the program:

At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.

If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.

So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.

So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.

Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.

Then c (7) and g (10) are added together and displayed.

PLEASE HELLPPPPP EVERYONE IS IGNORING THISSSSSSSSSS
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.

Answers

Answer:

Permissive licenses are also known as Apache style or BSD style. They contain minimal requirements about how the software can be modified or redistributed

Explanation:

What is the importance of different camera angles ?

Answers

Answer:

the camera angle helps the Creator to establish different relationships between the subject and even between the audience and the subjects. it's very important to master these techniques if you want to become a pro filmmaker!

Different camera angles can capture
a different point of view. This means that with a different angle and the same subject you can get different pictures that evoke different feelings.

please an urgent answer
will give brainliest
what is the definition of bucket address.​

Answers

Is this technology? Let me know so I can help you!!

Use the drop-down menus to complete each of the following sentences. Choose the best answer. For some external components such as flash drives and external hard drives, the safest way to remove them from a computer is to _______. Sleep mode and Hibernate mode are ________ that help you safely put your computer in a low-power state when you’ll not be using it for a period of time. Cleaning dust from your keyboard, monitor, and fans should be done _______. Magnets _______ a computer’s performance. Heat, humidity, and cold can damage a computer’s _______. You should check all computer cords for the safety of _______.

Answers

Answer:

1: eject them

2: power-saving modes

3: regularly

4: may damage

5:internals and externals

6: you and the computer

Explanation:

Answer:

1: Eject Them

2: Power-Saving Modes

3: Regularly

4: May Damage

5: Internals and Externals Components

6: You and the Computer

Explanation:

1. For some external components such as flash drives and external hard drives, the safest way to remove them from a computer is to Eject Them

2. Sleep mode and Hibernate mode are Power-Saving Modes that help you safely put your computer in a low-power state when you will not be using it for a period of time.

3. Cleaning dust from your keyboard, monitor, and fans should be done Regularly.

4. Magents May Damage a computer’s performance.

5. Heat, humidity, and cold can damage a computer’s Internals and Externals Components.

6. You should check all computer cords for the safety of You and the Computer.

Sora is preparing a presentation describing policies included in President Lyndon Johnson’s "Great Society” and wants to use a relevant online source.


Which source is the most relevant for the presentation?


a]-an interview with history students about the “Great Society”


b]-a photograph of Johnson making his “Great Society” speech


c]-a chart describing the conditions that led to the “Great Society”


d]-an audio recording of Johnson’s “Great Society” speech

Answers

Answer:

Option d) is correct

Explanation:

To prepare a presentation describing policies included in President Lyndon Johnson’s "Great Society”, the most relevant source that Sora should use is an audio recording of Johnson’s “Great Society” speech.

An audio recording of Johnson’s “Great Society” speech can give a more proper clarification and information regarding policies included in President Lyndon Johnson’s "Great Society”.

So,

Option d) is correct

Answer:

the answer is D

Explanation:

I just took the quiz :)

How do we store value in a variable? Give an example

How do we use the value in variable? Give an example

Answers

Answer:

hi

Explanation:

im not smart

PLEASE HELP ASAP!! Timed test!!
Lakendra finished working on her monthly report. In looking it over, she saw that it had large blocks of white space. What steps could Lakendra
take to reduce the amount of white space? It’s more than one answer!!
A. Include more special effects
B. Have an unjustified right margin
C. Increase the use of boxes and rules
D. Adjust column spacing

Answers

Answer:

d i think

Explanation:

What is returned by the code: range (20, 100, 30) ?

Answers

Answer : (20, 50, 80)





The code returned for range (20, 100, 30) is (20, 50, 80).

What is code?

The line of code returns the ASCII code.

ASCII, has the full form American Standard Code for Information Interchange. It consists of a seven bit code in which every single bit represents a unique alphabet.

Thus, the code returned for range (20, 100, 30) is (20, 50, 80).

Learn more about code.

https://brainly.com/question/2596551

#SPJ2

WILL GIVE BRAINLIEST IF IT IS RIGHT!! 25 POINTS!!!
Dacey needs to calculate the difference between 8,794 and 5,632.
Which Python statement should Dacey use to calculate this?
A.) print(8,794 - 5,632)
B.) print(8,794 * 5,632)
C.) print = 8,794 + 5,632
D.) print("8,794 - 5,632")
(this is for Coding)

Answers

Answer:

A

Explanation:

When you are finding the difference in a code you are subtracting the bigger number from the smaller one. You wouldn't technically use " " when printing a number equation as it doesn't work.

Answer:

The answer is A

Explanation:

they are not multiplying so its not b

they are not adding so its not c

there is NOT quotation marks when calculating.

Why should you delete files from your computer?


so that you will have less work to do

because only one hundred files can be saved in a directory

to increase the computer's efficiency

to improve your productivity

Answers

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

Answer:

To increase the computer's efficiency.

Explanation:

Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.

I hope this helps :)

The new tag in HTML 5 means that it explanation or pronunciation of characters for Asian typography O sets a container for an external application (non-HTML) isolates text that is formatted in a different direction from other text o creates multiple media resources for < video > elements​

Answers

Answer:

yes very correctExplanation:

why we have to maintain the good condition of tools and equipment?​

Answers

Answer:

Construction tools and equipment suffer a lot of wear and tear. Hence, it is important to maintain them regularly. This will help increase the service life as well as the performance of the equipment. Precautionary maintenance of tools and equipment will also help reduce unwanted expenses related to broken or faulty equipment

Explanation:

Which of the following are advantages of automatic updates?

Answers

Answer:

I think maybe b or d

Explanation:

Answer:

It's A, B, and D

Explanation:

What is one benefit of Powerpoint Online?
A.) PowerPoint Online is the full version of the Powerpoint application.
B.) Only one user has access to and editing rights for a presentation at a time.
C.) PowerPoint Online is not password protected, which makes it easier to use.
D.) Presentations can be shared and reviewed by several users on the internet.

The answer is D.)Presentations can be shared and reviewed by several users on the internet.

Answers

Answer:

D) Presentations can be shared and reviewed by several users on the internet.

Explanation:

One benefit of Powerpoint Online is that Presentations can be shared and reviewed by several users on the internet.

What is PowerPoint presentation?

PowerPoint can include a pictorial presentation to communicate a particular information or idea.

The slide can be share among individuals to give them access to the information.

Therefore, One benefit of Powerpoint Online is that Presentations can be shared and reviewed by several users on the internet

Learn more on PowerPoint below

https://brainly.com/question/23714390

#SPJ9

If you could design an app for a phone or tablet, what would it be? Explain your design in at least a paragraph.

Answers

Answer:

If i were to design an app for a phone or a tablet, it would probably be about cloth styles...

Explanation:

Sowwy but I don't have time to write a paragraph.. tho search information about this and see what you find.. hope I helped :)

Answer:

I would design  an app for hospital patients to communicate on.

Explanation:

Due to the pandemic, people admitted to the hospital for long term diseases are currently stuck in their rooms not being able to communicate with other patients on their floors. This app can fix that and help people make new friends.

The binary number represented by the voltage graph below is

I will give you brainlist if you actually answer

Answers

Answer:

the answer is the pattern is odd numbers like Odd numbers are whole numbers that cannot be divided exactly into pairs. Odd numbers, when divided by 2, leave a remainder of 1. 1, 3, 5, 7, 9, 11, 13, 15 are sequential odd numbers. Odd numbers have the digits 1, 3, 5, 7 or 9 in their ones place.

Explanation:

Answer:

11010100

Explanation:

why is it important to make sure link is from a trusted source?

Answers

Answer:

So to make sure itś true not false

Explanation:

Answer:

so you know that the information is trusted and correct. Take Wikipedia as a example people can edit any passages thingy's. Or it can cause you to have viruses and stuff

Explanation:

hope this help !!:):

Workers in a child care facility or preschool are part of what career path?
A. education and training
B. health care
C. human services
D. hospitality

Answers

Answer:

A

Explanation:

Preschool teachers show education

A. Education and training

HELP ME PLEASE PLEASE PLEASE!!!! IM BEGING YOU!!!!
In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.

Answers

Answer:

Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.

Explanation:

Good Morning! Please Help Me With This New Question!

In your own words, describe in detail the different types of image licensing. How does image metadata play a role in these licenses and why is that important.

Answers

Answer:

Photo metadata is a set of data describing and providing information about rights and administration of an image. It allows information to be transported with an image file, in a way that can be understood by other software and human users.

Explanation:

write an article for publication on why every student should be computer literate​

Answers

Answer:bankrupt

Explanation: no money on your card lol i hope you haveing a great day and i want you to know that you got this babe like is life is good then great but if not then it will get better beause you will make it get better

Section 6.9 of your textbook ("Debugging") lists three possibilities to consider if a function is not working.

Describe each possibility in your own words.

Define "precondition" and "post-condition" as part of your description.

Create your own example of each possibility in Python code. List the code for each example, along with sample output from trying to run it.

Answers

Answer:

www.dso hellooo miaralo

con Arrange the following steps in conducting preventive maintenance of compentylook
by wing the number in the blank provided
Secure a borrowers slp from your teacher
Perlombricating procedure
out the splom conectly intended for the needed to
Read and analyze the use of preventive Maintenance Schedule form
Apply thin coat of oil on the parts for a long period of time
Open the bearing cover and opply rose
Determine the types of tools and machines needed to be caled
Determine the parts of the machine needed to be lubricated
ou requisition splor in releasing the lubricants needed
Perform the task according to the prescribed schedule and the signed machine​

Answers

Dhdhdirhhdieneyneynsys subsided dumdudnydb dundudnydb udndundyb. Dundundybd dundundyou did not have urge

HELP. PLZZZZZZZZ. ASAP


Dropdown.


You defined the raft class as shown.

class raft:
def __init__(self,capacity):
self.capacity = capacity
self.location = 'Gauley'
self.repairs = []
The code, raftA = raft(45), creates a(n) of the raft class.


instance

function

method

constructor

Answers

Code, raft A = raft(45), creates a(n) self of the raft class.

What is raft class?

Code is a term used to describe a set of rules or instructions expressed in a specific computer language.

Raft is a mechanism that ensures that every node in the group of computer systems accepts the same set of state transitions and is universal for spreading state machines among them.

Therefore, Using the raft consensus technique for both the election of the leader and data replication,  raft A = raft(45), creates a(n) self of the raft class.

Learn more about raft class, here:

https://brainly.com/question/21709647

#SPJ1

Can somebody help me and make a code for this in PYTHON, please? I would be very thankful!

Find sum of the first n even numbers.
Without using formula (n*(n+1)).

Answers

Answer:

number = int(input())

x = 0

y = 0

for n in range(number):

if n % 2 == 0:

x += n

else:

y += n

print(x)

print(y)

What is the legal precedence that affects data collection and data preservation as it relates to the digital forensics process

Answers

Answer:

Following are the solution to this question:

Explanation:

Some certain laws affect collection and data preservation procedures. When an electronic crime happens, government employees must be ordered to continue with both the inquiry or permission by their senior government officials. The digital forensic investigator has to comply with the laws of a country as they apply to both the situation so if conducting out such a digital forensic analysis. Many law safeguards that rights of patients who could obstruct their investigator. Its culprit can manipulate or interfere with digital evidence until the inquirer gathers and maintains this. There are many limitations on permit study. 

When its private data is revealed, the Electronic Communications Protection Act (ECPA) has been adopted to protect the privacy rights of its ISPs' consumers. That protects people (suspect/culture) from the investigators by just not acquiring its ISP's information, in many specific regulations are affecting the process of digital forensic data collection and preservation.

There are differet kinds of tools in the box identify the tools that we leed in embroidery.Write your answer in the blank

Answers

Answer:

The tools are listed below.

Explanation:

There are many tools used in embroidery, the basic ones are mentioned below:

- Needles: there are needles like crewel needle, Milliner needle, tapestry needle.

- Hoops and frames

- Embroidery Scissors

- Pinking shears

1. Is the function void or return
a. void
b. return
2. What is the result of the following expression: int r = 3; r%2 == 0;
a. it evaluates as true
b. it evaluates as false
c. nothing happens

Answers

Answer:

(a) void

(b) Nothing happens

Explanation:

Solving (a): void and return

A function that returns no value is referred to as a void function.

On the other hand, a void can not be return or named return.

So, the function is void

Solving (b):

r = 3

Required

The result of r%2 == 0

Substitute 3 for r in r%2 == 0

3%2 == 0

3%2 is 1.

So, we have:

1 == 0

Hence, the equivalent of r%2 == 0 is 1 == 0.

However, nothing will happen because there is no instruction attached to the statement (i.e. r%2 == 0;)

Other Questions
Which statement correctly describes the relationship of the data shown in the scatter plot?A. The data are insufficient for correlation.B. The data show a negative correlation.C. The data show a positive correlation.D.The data do not show a correlation. Breifly explain the events involved in the invention of photography FAST Calculate the pH of a solution that is prepared by dissolving 0.23 mol of hydrofluoric acid (HF) and 0.57 mol of hypochlorous acid (HClO) in water and diluting to 3.60 L. Also, calculate the equilibrium concentrations of HF, F2, HClO, and ClO2. (Hint: The pH will be determined by the stronger acid of this pair.) -2x-4=16Show each step of your work. solve using substitution methodX-7y=10 X=2y Calculator6What is the area of this figure?543Enter your answer in the box.21units6-5-3-2135-1-1--2- What type of figurative language is the statement below and what does it tell you about the wind from the hurricane? "And the wind had no mercy for him. It shoved him, poked him, and striped his clothes which is more, 6 miles or 31,678 feet ? which element from welles's version of macbeth shows that he had changed the setting of the play find the exact trig value [tex]cos(11\pi /6)[/tex] ) Which expression is equivalent to 150 + 20?5(3C+4)15(c +20)15(C+4)5(3C + 20) Mountain Ranges are located near ______________________________ boundaries. make d the subject of the formula h= d/3 +2 True or false Lincoln's Gettysburg Address was delivered to celebrate the opening of a museum. Given f(x) = (x + 5)2, find f(9).O A. 28O B. 196O C. - 196O D. 16 What is the answerHelp me please Can you help me please 12. Mrs. X realizes her husband wants her to embroider tulips on his slippers becauseA. they're Miss Y's favorite flower.O B. they're expensive and custom-made.O C. his slippers always go missing.O D. they're Mrs. X's favorite flower. 14. Scientist wanted to know if temperature effected the movement ofblackworms. What is the dependent variable?-Temperature-Movement-Amount of Blackworms-Scientists Why did the United States want to expand?