A _____ is a grid that displays fields as columns and records as rows.

Answers

Answer 1

Answer: it is a datasheet because data is like a a place to keep things in and you can organise that in many different way's


Related Questions

How do we ensure that future technologies are fair to society? IT professionals and governments must follow ethical principles in the creation of new technology. IT professionals and governments must follow ethical principles in the creation of new technology. It is not possible to utilize ethical principles when creating new technology. It is not possible to utilize ethical principles when creating new technology. Allow the IT industry to regulate itself. Allow the IT industry to regulate itself. Encourage IT professionals to apply current laws and regulations.

Answers

To ensure that future technologies are fair to society, IT professionals and governments must follow ethical principles in the creation of new technology and also apply current laws and regulations.

What is technology promotion?

The use of technology is one that can promote student zeal by given them a form of positive experiences.

Note that to make sure that future technologies are fair to society, IT professionals and governments have to follow all ethical principles in the development of new technology and also they should use the current laws and regulations that are governing IT technologies.

Learn more about technologies from

https://brainly.com/question/25110079

The way in which information travels on the internet, not as a single piece but in chunks.

Answers

If this is a true or false question then it’s true.

If your asking for what those chunks are then packets. I’m a packet addict.

Which service works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends

Answers

The service that works in conjunction with EC2 Autoscaling in order to provide predictive scaling based on daily and weekly trends is target tracking.

How can I employ Predictive Scaling with target tracking?

Predictive Scaling works is known to be one that works in line with target tracking. They both help to make one's EC2 capacity to change more better to one's incoming application traffic.

Note that target tracking scaling policies is one where a user has to select a scaling metric and set a target value.

Learn more about Autoscaling  from

https://brainly.com/question/17661222

what is the answer
i don't know how to decode this, could i get the answer without any links

Answers

Answer:

Try the Cesar cypher

Explanation:

The Cesar cypher shifts the letters one side

C-13 You just got a call from the University system administrator, who says that either you or your roommate is issuing denial-of-service attacks against other students from your shared network segment. You know you are not doing this, but you are unsure about your roommate. How can you tell if this accusation is true or not

Answers

Answer:

take a subtle aproach

Explanation:

Please help me on this it’s due now

Answers

I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.

Definition:

            Logistics Manager: person in charge of overseeing the purchasing

                                            and distribution of products in a supply chain

            Material Handlers: responsible for storing, moving, and handling

                                            hazardous or non-hazardous materials

            Inventory Managers: oversee the inventory levels of businesses

Hope that helps!

Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas

Answers

Answer:

The answer is ( D ) I hope this answers your question

Which of the following is NOT a correct flowchart shape?

A. Parallelogram
B. Oval
C. Diamond
D. Rectangle
E. Star

Answers

I think the answer is star because in a flowchart, the most common shapes are a parallelogram, ovals, diamonds, and rectangles. Stars aren’t used in flowcharts.

Hope this helps :)

Answer: Star

Explanation:

_________ is a method of encoding data so that it is unreadable to unauthorized individuals. The data can only be decoded if the receiver of the encoded message has access to a special key.

Answers

Answer:Encryption

Explanation:I took my test for CIS 110 and guessed and got this question right.

A class researching the world’s population would like to include a graph that shows historical changes. They have information from several online media resources.

Which options should they choose during their evaluation process? Check all that apply.

a teacher’s aide who creates world population materials for a class
a professor who publishes world population research in a journal
a United Nations report that analyzes trends in the world’s population
a nonprofit that tracks how the world’s population affects policy decisions
a local news program that evaluates why some countries are overpopulated

Answers

A professor who publishes world population research in a journal

Answer:

b,c,d

Explanation: i took the test and bc im awsome

How many internet browser sessions can you have open at one time?.

Answers

Theoretically there is no limit that I know of, however it uses RAM and will eventually use all available RAM.

Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?

a. Each person needs to send email with his/her part of the project individually every day

b. Each person should be on a cloud folder and sync their files as they are working through their project

c. Each person needs to send a group email to the team as soon as any updates are completed

d. Each person should post their updated information on a team website so it is available for anyone to see

Answers

The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.

What is cloud computing?

Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.

In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.

Read more on cloud computing here: https://brainly.com/question/19057393

write a program to calculate sum of first ten natural numbers​

Answers

Answer:

Explanation:

total = 0

i = 0

while i<=10:

   total = i +total

print(total)

The master program that manages how other software can use the computer hardware is called the:.

Answers

the master program that manages how other softwares use the computers hardware is called the bios

which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website

Answers

Hello!
Answer: B. Library.

I hope this helps you!

a customer willl borrow

Answers

Answer: C. the PC

Explanation: The motherboard is not included in the passage

define a touch-sensitive pad and state one use​

Answers

Answer:

A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.

Explanation:

Dose brainly give you notifications on you're phone when you go into the site

Answers

Answer:

Yep it does ^_^



Differentiate between
Operating system and
language translator

Answers

It is a program or a series of programs which provides communication between the user and the computer hardware. Translators are programs which convert instructions in assembly language or high level languages into machine languages because computer can only understand machine language.

Which ready-to-use features do WYSIWYG editors offer?
A.
meta tags
B.
database
C.
HTML tags
D.
web host
E.
image gallery

Answers

Answer:

C. HTML tags

Explanation:

In computing, WYSIWYG, an acronym for What You See Is What You Get, is a system in which editing software allows content to be edited in a form that resembles its appearance when printed or displayed.

A cybersecurity specialist facilitates penetration testing by using functional exercises. The specialist decides to use a war game approach and create teams. Which team operates the security system

Answers

The team that should operates the security system is the blue team.

What is war gaming strategy?

In a war game approach, the teams of the senior managers of a  firm is said to often play their own firm, and they do make selection of any group of its competitors and marketplace.

Note that this form of exercise is said to help simulates a composition of business conditions and gives a lot of lessons and guidance for the main thing. Note also that the blue team do defend the system against and responds to any form of attack from the red team.

Learn more about cybersecurity from

https://brainly.com/question/26260220

Time machine could not create a local snapshot to back up from

Answers

Answer:

Time machine could not create a local snapshot to back up from Disk Error.

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?.

Answers

You did not post the full question but if there is one called “hyper visor” or “Xen” or something to do with that, it’s probably the answer.

[C Pointer] Not all arithmetic operations may be performed on pointers. For example, you cannot ________ or _______ a pointer.

Answers

It is not all arithmetic operations may be performed on pointers. For example, you cannot multiply or divide a pointer.

What arithmetic operations cannot be done on pointers?

We cannot carry out all type of arithmetic operations with the use of the pointers.

Note that the Pointer arithmetic is said to be a little bit different from arithmetic we normally use and as such, the only used arithmetic operations applicable on pointers are known to be the addition of numbers.

Learn more about arithmetic operations  from

https://brainly.com/question/4721701

The following flowchart symbol is used to repeat instructions:

A. Rectangle
B. Square
C. Circle
D. Hexagon

Answers

d

Explanation:

⇛σ=

n

∑f(x−

x

)

2

Find f(x-x^-)²

It's

313.29+806.45+474.32+72.9+58.19+532.9+605.16+0+497.29

3360.5

Now

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{\dfrac{3360.5}{50}\end{gathered}

\begin{gathered}\\ \rm\Rrightarrow \sigma=\sqrt{67.21}\end{gathered}

⇛σ=

67.21

\begin{gathered}\\ \rm\Rrightarrow \sigma=8.2\end{gathered}

⇛σ=8.2

In the Linux boot process, the master boot record (MBR) loads a(n) __________ program, such as GRUB or LILO

Answers

Answer:

Boot loader

Explanation:

This is a small program that is stored within the MBR or the GUID partition table that is used to help load in an operating system into the memory

In what way. If any, does click-lacking differ from cross-site scripting?

Answers

Answer:

In cross-site request forgeries, the user's web browser acts as the confused deputy, where as in clickjacking, the user is the confused deputy.

Explanation:

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Answers

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

You can access elements in a list by using an index the same way that you can index a character from a.

Answers

One can access elements in a list by using an index the same way that you can index a character from indexing into the string.

What is String Indexing?

Strings are known to be a form of ordered method of character data, 00:15 and the specific characters of a string.

They can be accessed straight through the use of  numerical index. String indexing in Python is known to be a kind of zero-based in nature.

Learn more about indexing from

https://brainly.com/question/4692093

Which example best describes an impact of computers on the economy?
A. Bullying on social media has increased dramatically and across
multiple platforms.
B. Some local businesses have closed because they couldn't
compete with large online sellers.
C. Apps give points for purchases that buyers can use to obtain
discounts.
D. A platform designed to make all user content publicly available
creates privacy issues.

Answers

The answer is D
Ik this cause I took the test

Answer:

B

Explanation:

The reason I say "D" is not the answer because I put the answer in and it was wrong.

Other Questions
English 3 module 5dba review:How did it term in the tone versus the mood of a poem and how to use context clues effectively? What are the 5 major Oceans? Describe the characteristics of this scatterplot. What number does 10 need to be divided by to make 5? What is the medical field described in the paragraph? Leigh works in a company that uses genes to develop better pharmaceutical treatments. Leigh is pursuing a career in An eye and eyebrow. a short line extends down from the eye and a second line curves out and to the right with a small spiral at the end. this ancient egyptian symbols is the ____________. a. eye of horus c. scepter b. red crown of lower egypt d. eye of the ankh please select the best answer from the choices provided a b c d 1. Which philosopher called all people the "sovereign meaning all power should rest with them?A. Thomas HobbesB. John LockeC. Charles MontesquieuD. Jean-Jacques Rousseau Question 1 The Berlin Wall separated what?Question 1 options:North and South BerlinEast and West BerlinChina and KoreaFinland from SwedenQuestion 2 The living conditions of West and East Berlin were very similar despite living under different systems.Question 2 options: True FalseQuestion 3 The Soviet Union spent large amounts of money on the military which left little for the people living in the Soviet Union.Question 3 options: True FalseQuestion 4 What important freedoms were restricted under the Soviet Union?Question 4 options:Right to violent revoltFreedom of Speech and pressFreedom to choose your own countryFreedom of the skysQuestion 5 An important book written by Alexander Solzhenitsyn demonstrated the harsh treatment in Soviet prison camps, this novel was call what?Question 5 options:Soviet GloryOne day in the Soviet UnionThe GulagsOne day in the Life of Ivan DenisovichQuestion 6 As the idea of Dtente moved forward one central goal for the west was the promotion of what important moral idea.Question 6 options:Animal RightsHuman RightsFreedom of the SeasSpace ExplorationQuestion 7 In the late 1970s the Soviet Union invaded this country.Question 7 options:IndiaChinaAfghanistanNepalQuestion 8The Soviets failed in Afghanistan partially because the Afghan people fighting them were supported with money and weapons by who?Question 8 options:ChineseUnited StatesJapanGermanyQuestion 9 ( The two leaders of the U.S. and Soviet Union that helped bring an end to the Cold War and tear down the Berlin wall where who?Question 9 options:Kennedy and StalinCarter and LeninReagan and GorbachevNone of the aboveQuestion 10 What was one of the first Soviet controlled countries to re-establish their freedom and Independence after dtente?Question 10 options:Russia RomaniaHungaryFrance How do I find the mean of these numbers? What is the square root of 16?8i4i4i8i 8 less than the product of 3 and j Pleas help. 5 Divided by 1/8 Is there any bias in the following survey question? Explain.Do you prefer delicious chocolate ice cream or boring vanilla ice cream? The Build-Your-Own-Sailboat booth that Althea visited gave her and hers friend the chance to make a sailboat model. Each boy chose a different quadrilateral for a sail. Althea chose a trapezoid, and her friend chose a parallelogram. (a) Compose each shape into a rectangle to determine the area. The formula for area of a rectangle is A = lw . What is the area of each quadrilateral?(b) Althea said that all quadrilaterals can be decomposed into triangles to find the area of the quadrilateral. Is this statement always true, sometimes true, or always false? Give two examples to support your answer. hard question help!!!! Find the surface area, in square inches, of a cube whose volume is 8 in. conjugate parecer in the sentence la escuela primaria (blank) facil Does anyone know what this is? PLEASE HURRY Jerry has a new job and earns asalary of $45,000. Victoria has a newjob and earns a salary of $54,000.Jerry will receive a salary increase of$2,500 per year, and Victoria willreceive a salary increase of $1,500per year.45.054.045.0540Which equation can be used to find xthe number of years it will takeJerry to earn the same salarv asVictoria? ans this please i have alot this to do help me