Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use

Answers

Answer 1

Answer:

A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated,  organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file

Explanation:

A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer

Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format

Structured file are files that are keeps data in a uniform organized structural format


Related Questions

In the early 1900s, engineers introduced the first_____.

Answers

They introduced the first radio
The answer is: a0 radio.

In the early 1900s, engineers introduced the first “a0 radio”.

Define Data communication​

Answers

Explanation:

Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses. 

are the exchange of data between two devices For data communications to occur, the communicating devices must be part of a communication system made up of a combination of hardware

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.

Answers

Answer:

They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements

When constructing a project network for a project with 25-100 tasks, a common industry practice is to

utilize the "yellow sticky" approach

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

What is a single physical processor? plz help​

Answers

Answer:

A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.

Explanation:

describe how it is necessary to design documents, files, forms/inputs, reports/outputs and validation​

Answers

Answer:

Explanation:

Good organization, complete information and clear writing are the most effective ways to design a document.

I hope this helps

You are concerned that if a private key is lost, all documents encrypted using your private key will be inaccessible. Which service should you use to solve this problem

Answers

Answer:

Key escrow.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Hence, if a private key is lost, all documents encrypted using that private key will be inaccessible to the users. Thus, the service that can be used to solve this problem is a key escrow because the cryptographic (private) keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:

A. Cung cấp nước, dinh dưỡng

B. Giữ cây đứng vững

C. Cung cấp nước, oxy, dinh dưỡng và giữ cây đứng vững

D. Cung cấp nguồn lương thực

Answers

Answer:

C

Explanation:

In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Answers

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

What is ABC computer?​

Answers

Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.

Explanation:

NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.

Answers

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

which computer is used in hospital for ultrasound?​

Answers

Answer:

Pentium Powered Computer

Explanation:

Pentium powered computer

Pratibha is working in a bank. She is creating a database to store the details of the bank customers. Which of the following fields of table Bank_Customer can be selected as primary key?​

Answers

Answer:

Acc_No

Explanation:

Given

See attachment for table Bank_Customer

Required

Which field can be used as primary key

A field, once made the primary key, cannot contain duplicate entries.

This means that Pratibha has to select a field that can be unique to all customers.

From the table, we have:

Acc_No [tex]\to[/tex] No two customers can have the same account number

Cust_Name [tex]\to[/tex] Multiple customers can have the same name

DOB [tex]\to[/tex] Multiple customers can have the same date of birth

PAN_NO [tex]\to[/tex] No two customers can have the same pan number; however, pan number is often issued by tax department of a country.

Opening_Bal [tex]\to[/tex] Multiple customers can have the same opening balance,

Hence, the field to use as primary key is:

Acc_No

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequence as the parameters b. must have data types that are compatible with the parameters c. have the same names as the parameters d. all of the above e. a and b only

Answers

Answer:

a and b only

Explanation:

If you have a function foo(int a, double b) { } you can call this as foo(x,y), just as long as x is an int and y is a double.

write the name of the technologies used in all five generation​

Answers

Answer:

First Generation (1940-1956)

First Generation (1940-1956)Second Generation (1956-1963)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)

Answer:

Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .

Explanation:

the paint 3D program is used for drawing picture true or false​

Answers

Answer:

The answer is TRUE we use paint program to draw.

Explanation:

#swag

Answer is truee the paint 3d program is used for drawing pics

how do you take a screenshot on a Samsung tablet

Answers

Explanation:

to capture a screenshot press and hold the power and volume down button at the same time for approximately 2 seconds

Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally go up to ______________ feet above airport elevation and the outer ring begins at _______ feet above the ground and extend vertically to _________ feet above airport elevation. (NOTE #1: no commas) (NOTE #2: All values on the Sectional Charts are in MSL values)

Answers

Answer:

5 nautical mile

4000 feet

1200 feet

Explanation:

Class C Airspace has inner ring which is also an inner core has usually 5 nautical mile radius. This extends from surface area upto 4000 feet above airport elevation and outer ring starts at an altitude of 1200 feet above ground and is extended upto 4000 feet above airport elevation.

how do I answer question

Answers

Answer:

To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.

Explanation:

Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.

Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)


Select all that apply

A

game designer


B

network engineer


C

graphic designer


D

cashier

Answers

Answer:

not d

Explanation:

IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)

16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.

Answers

Answer:

A) A function can hold multiple return statements, but only one return statement executes in one function call

Explanation:

This is because each function can only return one value, whether it be an integer, String, or other object.

However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.

Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.

Hope this helps!

The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.

The following information should be considered:

This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.

Therefore, we can conclude that option A is correct.

Learn more about the function here: brainly.com/question/12431044

What is the base value of the number system that consist of the digit set {0, 1, 2, 3, 4, 5, 6, 7}?

(a) Two
(b) Eight
(c) Sixteen
(d) Seven

Answers

Answer:

B. Eight because octal number system has eight elements

Which is not true about climatic normals?

Multiple choice question.

A)
They can differ from daily weather conditions.

B)
They are gathered at one location.

C)
They are averaged over a 30-year period.

D)
They describe average conditions.

Answers

Answer:

I think c is correct answer

Explanation:

hope it's help yu

who is the father of computer​

Answers

Answer:

Charles babbage is the father of computer

Explanation:

Charles Babbage is a father of computer

Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.

Answers

Answer:

Use an encryption algorithm

Explanation:

An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.

Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.

What method is used to prevent the random number generator from always starting with the same number?

seed()

random()

randint()

initialize()

Answers

Answer:

seed()

Explanation:

Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.

Hope this helps!

Answer:

the answer is seed()

Explanation:

i took the assignment

14. Applying formatting using the commands in the ribbon is called style
(page layout, override, justification)

Answers

Answer:

Override

Explanation:

Hope this helps

Other Questions
If a^2+b^2= 4 and ab = 5, what is the value of(a+b)^2?A. 10B. 12C. 14D. 16 Tall buildings can be a landmark, but why some countries limit the height of houses?IELTS WRITING a. In which age people started to live permanently and concept of society was developed? Choose the correct correspondence A rocket travels vertically at a speed of 1200 km/h. The rocket is tracked through a telescope by an observer located 16km from the launching pad. Find the rate at which the angle between the telescope and the ground is increasing 3 min after lift-off. Round your answer to the nearest hundredth rad/hr What is system software?No SpamAnswer quickly Choose the correct statements about the ROC curve.A. By plotting the true-positive rate against the false-positive rate for different threshold values, the ROC curve can be used to select the optimal model.B. ROC stands for Receiver Operating Characteristic curve, which was originally developed to detect enemy aircrafts on radar.C. The ROC curve is a useful diagnostic tool for determining the optimal classification model.D. The ROC curve was originally developed to optimize healthcare and detect congestive heart failure readmission rate. Lena is asked to write an explicit formula for the graphed geometric sequence.On a coordinate plane, 3 points are plotted. The points are (1, 1), (2, 2.5), (3, 6.25).What value, written as a decimal, should Lena use as the common ratio A student was given a 2.850-g sample of a mixture of potassium nitrate and potassium bromide and was asked to find the percentage of each compound in the mixture. She dissolved the sample and added a solution that contained an excess of silver nitrate, AgNO3. The silver ion precipitated all of the bromide ion in the mixture as AgBr. It was filtered, dried, and weighed. Its mass was 1.740 g. What was the percentage of each compound in the mixture A silo is built in the shape of a cylinder with a cone for a roof. If the height of thecylinder is 5 m, the radius is 2.8 m and the slant height of the cone is 6,6 m,determine the amount of material needed to create the rounded sides and conicalroof, Round to the nearest tenth of a cubic m. Define population educstion. State any four purpose of including it in school education. 1000 randomly selected Americans were asked if they believed the minimumwage should be raised. 600 said "yes." What is the 99% confidence intervalfor the proportion of Americans who believe that the minimum wage shouldbe raised? Read the scenario.What type of method was used by the traffickers torecruit the girl?A young girl from Ukraine reads an advertisement in alocal newspaper about modeling jobs in Hollywood. Shecalls the number and they tell her that many of theirmodels have gone on to work in movies and TV shows inthe United States. When she arrives at the airport, theypick her up and take her to an apartment. There, they takeher passport and tell her that she must sell sex servicesand give them the money to pay back the cost of herairplane ticket.O offer of educationO payment for smugglingO offer of workfalse love interest Hillyard Company, an office supplies specialty store, prepares its master budget on a quarterly basis. The following data have been assembled to assist in preparing the master budget for the first quarter:a. As of December 31 (the end of the prior quarter), the company's general ledger showed the following account balances:Cash 42,000 Accounts receivable 201,600 Inventory 58,050 Buildings and equipment (net) 352,000 Accounts payable 85,725Common stock 500,000Retained earnings 67,925 653,650 653,650b. Actual sales for December and budgeted sales for the next four months are as follows:December (actual) 252,000January 387,000February 584,000March 298,000April 195,000c. Sales are 20% for cash and 80% on credit. All payments on credit sales are collected in the month following sale. The accounts receivable at December 31 are a result of December credit sales. d. The company's gross margin is 40% of sales. (In other words, cost of goods sold is 60% of sales.)e. Monthly expenses are budgeted as follows: salaries and wages, $17,000 per month; advertising, $57,000 per month; shipping, 5% of sales; other expenses, 3% of sales. Depreciation, including depreciation on new assets acquired during the quarter, will be $42,420 for the quarter.f. Each month's ending inventory should equal 25% of the following month's cost of goods sold.g. One-half of a month's inventory purchases is paid for in the month of purchase; the other half is paid in the following month.h. During February, the company will purchase a new copy machine for $1,200 cash. During March, other equipment will be purchased for cash at a cost of $71,000.i. During January, the company will declare and pay $45,000 in cash dividends.j. Management wants to maintain a minimum cash balance of $30,000. The company has an agreement with a local bank that allows the company to borrow in increments of $1,000 at the beginning of each month. The interest rate on these loans is 1% per month and for simplicity we will assume that interest is not compounded. The company would, as far as it is able, repay the loan plus accumulated interest at the end of the quarter.RequiredUsing the data above, complete the following statements and schedules for the first quarter:1. Schedule of expeted cash collections:Hillyard Company Schedule of Expected Cash Collections January February March QuarterCash sales 77,400 77,400Credit sales 201,600 201,600Total collections 279,000 279,0002-a. Merchandise purchases budget:Hillyard Company Merchandise Purchases Budget January February March QuarterBudgeted cost of goods sold 232,200* 350,400 Add desired ending inventory 87,600 Total needs 319,800 350,400 Less beginning inventory 58,050 Required purchases 261,750 *$387,000 sales x 60% cost ratio = $232,200.$350,400 25% = $87,600.2-b. Schedule of expected cash disbursements for merchandise purchases:Hillyard Company Schedule of Expected Cash Disbursements for Merchandise Purchases January February March QuarterDecember purchases 85,725 January purchases 130,875 130,875 February purchases March purchases Total cash disbursements for purchases 3. Cash budget. (Cash deficiency, repayments and interest should be indicated by a minus sign.)Hillyard Company Cash Budget January February March Quarter Beginning cash balance 42,000 Add cash collections 279,000 Total cash available 321,000 Less cash disbursements: Purchases of inventory 216,600 Selling and administrative expenses 104,960 Purchases of equipment Cash dividends 45,000 Total cash disbursements 366,560 Excess (deficiency) of cash (45,560) Financing: Borrowings Repayments Interest Total financing Ending cash balance 4. Prepare an absorption costing income statement for the quarter ending March 31.Hillyard Company Income Statement For the Quarter Ended March 31Cost of goods sold Selling and administrative expenses: 5. Prepare a balance sheet as of March 31.Hillyard Company Balance Sheet March 31Assets Current assets: Total current assets Total assets Liabilities and Stocholders' Equity Current liabilities Stockholders' equity Total liabilities and stockholders' equity In one of the examples he is working on, he knows that the two coordinates (0,6) and(8, 10) are on the function that he is deriving. Using the information from these twocoordinates, determine the slope and y-intercept of the function Mike is looking for, andthen write out the correct function. . A radio station transmitting at a frequency of 200KH, emits waves of wavelength 1.5 km.the velocity of the radio waves is Question down below thank you PLEASE SOMEONE ANSWER THIS ASAP!!!Given the geometric sequence with the first three terms shown below, answer the following questions.4,-8, 16,...Write the explicit formula for this sequence.What is the 12th term of the sequence?PLEASE ANSWER I HAVE AN IMAGE INCLUDED IF NEEDED !! Gomez argues that we need to increase the nation's output. Chang contends that our top priority should be a more equal distribution of income and output. It can be correctly stated that these two goals are:A. essentially unrelated.B. complementary because the realization of one will promote fulfillment of the other.C. at least partially competing because the redistribution of income might impair incentives to work and produce.D. complementary because a more equal distribution of income always promotes economic growth. What is one condition that must be met for a population to be in genetic equilibrium?