what are 7 types of data in ict give 2 examples for each pls

Answers

Answer 1

Answer:

There are two main floating-point data types, which vary depending on the number of allowable values in the string: Float: A data type that typically allows up to seven points after a decimal. Double: A data type that allows up to 15 points after a decimal. 5. Long. Long data types are often 32- or 64-bit integers in co

Explanation:


Related Questions

According to heidegger, what are the two dominant ways of understanding technology?.

Answers

The two dominant ways of understanding technology Instrumental and human activity.

What is dominant?
To be dominant is to exercise power. One male wolf in a pack engages in combat with the others, prevails, and rises to the position of leader. Dominus, which means "lord or master" in Latin, is where the word dominant originates. This is one of many names for God that you may be familiar with if you attended a Latin mass as a child. If you treat others as though you are their master, you are dominant. The word dominant can also be used to describe something frequent or typical. For instance, making calls was the primary function of cell phones when they first became available. Some people hardly ever make calls on their cell phones because they can do so much more now.

To learn more about dominant
https://brainly.com/question/26292537
#SPJ4

do you think authentication protocols are sufficient to combat hackers? in your opinion what can be done to further secure our data and identities?

Answers

In my opinion, this protocol is good enough to combat hackers and other system intruders who try to tamper with data in transit.

If passwords irritate you, two-factor authentication probably won't get as much attention. However, according to security experts, using two-factor authentication is one of the best ways to protect your online accounts from the most sophisticated hackers.

Two-factor authentication is so named because it adds another authentication factor to the normal login process in addition to your password. After entering your username and password, you will be prompted to enter a code. The code will be sent as a text message, email, or in some cases as a phone push notification. All in all, the day is just a few seconds longer.

Two-factor authentication (also known as "two-factor authentication") consists of something you know, such as your username and password, and something you have, such as your mobile phone or physical security key. Furthermore, it is a combination of what the user has. Use fingerprints or other biometrics to verify that the person is authorized to log in.

To know more about authentication click here:

https://brainly.com/question/28398310

#SPJ4

Gaining access to a safety deposit box using iris scanning is an example of​ _____________ authentication.

Answers

Gaining access to a safety deposit box using iris scanning is an example of​ Biometric authentication.

What is Biometric authentication ?

A security procedure called biometric authentication uses people's distinctive biological traits to confirm they are who they claim they are. Biometric authentication systems match recorded, verified, valid data in a database with physical characteristics or behavioral patterns.

What is database ?

A database is a planned grouping of material that has been arranged and is often kept electronically in a computer system. A database management system often oversees a database (DBMS).

What is an iris scanning?

Iris identification technology scans an individual's iris using visible or near-infrared light in a camera, which then examines it for about 240 different patterns and features.

For purposes of identification or verification, the data is converted to a template, or mathematical information that provides specifics about the iris, and compared to a reference database of iris templates.

Even those who are blind, have cataracts, have undergone eye surgery, or who wear glasses and contact lenses can use iris recognition.

Know more about iris scanning click on this:

https://brainly.com/question/1503139

#SPJ4

xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. what type of access control model is this approach using?

Answers

Since Xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. The type of access control model in this approach using option D: DAC: Discretionary Access Control.

What does "discretionary access control" mean?

The Trusted Computer System Evaluation Criteria is one that define discretionary access control as a sort of access control used in computer security to limit access to objects depending on the identity of subjects and or seen as groups to which they belong.

Therefore, in the above context, the concept of limiting access to things based on the identity of the subject is known as discretionary access control (the user or the group to which the user belongs). Access control lists are used to implement discretionary access control.

Learn more about Discretionary Access Control from

https://brainly.com/question/15152756
#SPJ1

See full question below

Xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. What type of access control model is this approach using?

A. MAC, B. RBAC, C. ABAC, D. DAC

describe with details how procedures (a.k.a. functions, methods, etc.) are executed using the program stack. explain the role of the calling sequence, prolog, and epilog in stack management

Answers

One of the areas of program memory used to store local variables and function calls is called the stack.

What is Stack Frame in Computer Organization?

The memory for local variables and other function calls or subroutines are stored on the stack frame whenever a function is called in our programme. In the application's memory's stack segment, each function receives a separate stack frame.

Features:

The memory allotted for a function call in the stack only exists during the time that the function is running; once the function is finished, we are no longer able to access its variables.After the calling function has finished running, the stack frame is destroyed, and the thread of the called function's execution picks up where it left off.Since the stack is used to store function calls, if our program uses a lot of recursive calls, the stack memory may be exhausted, leading to a stack overflow because the stack memory is constrained.The Stack Pointer (SP) and the Frame Pointer are both maintained by each stack frame (FP). Both the stack pointer and the frame pointer are always pointing up. Additionally, it keeps track of a programme counter (PC) that points to the subsequent command to be carried out.Every time a function call is made, a stack frame is produced in the stack segment. The arguments provided by the calling function are then pushed into the stack frame of the called function and given some memory there. Upon completion of their execution, they are popped from the stack frame. And the called function resumes the execution thread.

To Learn more About Stack Frame Refer To:

https://brainly.com/question/9978861

#SPJ4

which of the following scheduling algorithms could result in starvation? a. first-come, first-served b. shortest job first c. round robin d. priority

Answers

Scheduling methods based on priorities and shortest jobs first may cause hunger. Shortest Job First Preemptive Scheduling is often referred to as Shortest Next Time or Shortest Remaining Time (SRT) (SNT).

What do you mean by shortest job first preemptive?Shortest Job First Preemptive Scheduling is often referred to as Shortest Next Time or Shortest Remaining Time (SRT) (SNT). When a new process enters the ready queue while an existing one is still running and not finished, the option between preemptive and non-preemptive behavior becomes necessary.SJF delivers the least average waiting time for each process for a given collection of processes and their CPU bursts/execution periods, making it demonstrably optimal.Although Shortest Job First (SJF) is the best scheduling method since it provides the most throughput while minimizing average waiting time (WT) and turn-around time (TAT), it cannot be implemented in practice because a process's burst time can't be taken into account.  

To learn more about Shortest Job First Preemptive refer to:

https://brainly.com/question/14439995

#SPJ4

According to a forbes magazine study, the annual cost of cybercrime in the united states alone has reached how much?.

Answers

$100 million because of cyber crime

According to a Forbes magazine study, the annual cost of cybercrime in the united states alone has reached $100M.

What is the cost?

According to a Forbes study, the annual cost of cyber crime in the United States alone ahs gotten up to $100 000 000. This new trend has greatly affected cyberspace hence the need to invest in the sector and get to the root cost and possible solutions.

So, many activities by illegal operators in cyberspace has caused a lot of harm and the only solution is by limiting their activities.

Learn more about cybercrime and efforts to curb them here:

https://brainly.com/question/20068442

#SPJ2

which cisco ios command is used on a 2960 router to change the switch forwarding asic settings to make space for ipv4 routes?

Answers

IPv4 unicast routes are supported for static routing SVI configuration using the LAN Base routing template.

What is Lanbase routing?IPv4 unicast routes are supported for static routing SVI configuration using the LAN Base routing template.The memory allotted to unicast routing cannot be used by any other features thanks to the LAN Base routing template.Before using the routing template, your switch must have routing enabled. The switch supports any directly linked routes, default routes, 8 Routed SVIs, and 16 static routes (including user-configured routes and default routes) for the management interface.The switch's eight SVI slots can each get an IP address. We require two things to enable routing.Prior to enabling IP routing, turn on the lanbase-routing feature that SDM prefers.To make the change, you must reload the page.You can use the show sdm prefer command to confirm the change after the system reload.

To learn more about LAN Base routing refer

https://brainly.com/question/14294134

#SPJ4

sheila wants to extract the hour from the time, 12:00:56, in cell a1. which formula can she use to do this?

Answers

To extract the hour from the time formula she can use is =HOUR(A1).

What is Excel?

Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet. Data analysts and other users can make information easier to examine as data is added or altered by organizing data using tools like Excel. The boxes in Excel are referred to as cells, and they are arranged in rows and columns.

To extract time solely from datetime using a formula, simply follow these steps:

1. In the first cell of the list from which you wish to extract the time, A1, type the formula =TIME(HOUR(A1), MINUTE(A1), SECOND(A1)), hit Enter, and then drag the fill handle to fill the range. Only at that point was text eliminated from the list.

2. Next, format the cells with the desired time formatting by selecting Format Cells from the Format Cells menu on the right-hand side of the screen.

3. After you click OK, the time formatting is complete.

Click here to know about  time formatting in excel:

https://brainly.com/question/15431070

#SPJ4

instruction decode/register fetch: to compute the branch target address which may be used in the next step, what is the value of aluop?

Answers

The branch target address is determined as if the instruction were a branch even though it may not even be a beq instruction at the start of the Decode state. The resulting calculation is merely ignored if it turns out that the instruction is not a branch or if the branch is not taken.

Beq moves on to the BEQ state after the Decode state and compares the source registers there. To choose the values read from the register file as SrcA and SrcB, set ALUSrcA = 10 and ALUSrcB = 00. In order for the ALU to perform subtraction, ALUOp = 01 The ALU's Zero output asserts if the source registers are equal (because rs1 rs2 = 0).

What is Branch Target Address ?

Each cache line in a branch target address cache (BTAC) stores a minimum of two branch target addresses. A branch instruction address with a truncation is used to index the BTAC.

Which of the branch target addresses is used as the predicted branch target address is determined by an offset taken from a branch prediction offset table.

A branch history, a hash of a branch history and a portion of the branch instruction address, a gshare value, randomly, in a round-robin order, or other methods may be used to index the offset table.

To learn more about ALU, visit: https://brainly.com/question/15607873

#SPJ4

the below code int gethighspeedcycle ( double frequency, string architecture, int major count ); is called group of answer choices a) function definition. b) function invocation or function call. c) function implementation. d) function declaration or function prototype or function signature.

Answers

Function declaration or function prototype or function signature.

What is Function declaration?

An identifier that denotes a function is introduced in a function declaration, and it is optional to specify the kinds of the function parameters (the prototype). Unlike definitions, function declarations may appear both at the block and file scopes.

A function declaration consists of the keyword function, the required function name, a list of parameters enclosed in parentheses (para1,..., paramN), and a pair of curly braces (...); these brackets separate the body code from the declaration.

Function declarations (or prototypes) are typically added to a file's header, immediately within a function, or in a separate header file (the . h files).

A function with the given parameters is defined by the function declaration (function statement). The Function constructor and a function expression can also be used to define functions.

To learn more about Function declaration refer to:

https://brainly.com/question/23897143

#SPJ4

A device is sending out data at the rate of 1000 bps. A. How long does it take to send out 10 bits? b. How long does it take to send out a single character (8 bits)? c. How long does it take to send a file of 100,000 characters?.

Answers

Answer:
0.01s, 0.008s, 800s.

Explanation:

   To send 10 bits at 1000 bps, it would take 0.01 seconds.

   To send a character that is 8 bits, it would take 0.008 seconds.

   To send out 100,000 characters, it would take 800 seconds (just over 13 minutes).

   Note that a good internet speed is 25Mbps, or 2.5e+7 bps.

question 1: what is the smallest network that contains all the routed networks? construct the subnet tree of that smallest network, identifying the 4 routed networks with red lettering. is the smallest network the aggregate of the routed networks?

Answers

Subnet is the smallest network that contains all the routed networks.

What is Subnet?

A subnet, also known as a subnetwork, is a network within a network. Subnets improve network efficiency. Network traffic can travel a shorter distance without passing through unnecessary routers thanks to subnetting.

Assume Alice drops a letter in the mail addressed to Bob, who lives in the town next door to hers. To reach Bob as soon as possible, the letter should be delivered directly from Alice's post office to the post office in Bob's town, and then to Bob. If the letter is first delivered to a post office hundreds of miles away, it may take much longer for Alice's letter to reach Bob.

Networks, like the postal service, are more efficient when messages are routed as directly as possible. When one network receives data packets from another, the packets are sorted and routed by subnet so that they do not take an inefficient route to their destination.

To know more about the Subnet, visit: https://brainly.com/question/14985928

#SPJ1

From an it perspective, __________ is the process of predicting when a computer hardware system becomes saturated.

Answers

From it perspective, capacity planning is the process of predicting when a computer hardware system becomes saturated.

What is capacity planning?

Capacity planning is the process of determining when a computer hardware system will become saturated is to make sure that there are enough computing resources for the company's current and future needs. And that there are enough resources available for work with different priorities.

Therefore, according to it, capacity planning is the process of foreseeing the saturation point of a computer hardware system.

To learn more about capacity planning, refer to the link:

https://brainly.com/question/14761208

#SPJ1

if your class c address has a three-bit subnet mask, which of the following would be a subnetwork identifier? a. 203.16.34.33 b. 203.16.34.135 c. 203.16.34.32 d. 203.16.34.240

Answers

The subnetwork identifier for the given situation will be 203.16.34.32. The correct option is c.

What is a subnetwork identifier?

Routers use the Subnet ID to determine the best route between subnetworks.

There are 128 hosts in the first subnet network (S1). However, the first IP address (201.10.1.0) is the first subnet's network ID, and the last IP address (201.10.1.127) is the first subnet's Direct Broadcast Address.

A subnet mask is a 32-bit number that is generated by setting all host bits to 0s and all network bits to 1s. The subnet mask divides the IP address into network and host addresses in this manner.

If your class C address has a three-bit subnet mask, your subnetwork identifier in this case is 203.16.34.32.

Thus, the correct option is c.

For more details regarding subnetwork, visit:

https://brainly.com/question/9560066

#SPJ1

if a user enters a command and wishes to terminate it before its execution, what key presses can be used? (choose all that apply)

Answers

To terminate a command before its execution, the user can press Ctrl+C.

What is command?
A command in computing is a request for a computer programme to carry out a particular task. It could be sent using a command-line interface, like a shell, as input to a network service as part of the a network protocol, as an event in a graphical user interface brought on by the user choosing an item from a menu, or as a command sent to a computer over a network. The word "command" is specifically used during imperative computer languages. The name was given to these languages because statements in them are frequently written in an imperative mood, which is common in many natural languages. A command is typically compared to a verb in a language where an imperative statement is viewed as being similar to a sentence.

To learn more about command
https://brainly.com/question/25808182
#SPJ1

write the relational schema and draw the dependency diagram to meet the 3nf requirements to the greatest practical extent possible. if you believe that practical considerations dictate using a 2nf structure, explain why your decision to retain 2nf is appropriate. if necessary, add or modify attributes to create appropriate determinants and to adhere to the naming conventions.

Answers

Answer: It is necessary

Explanation:The first mouse was made of wood in 1964. consumes energy for about 200,000 homes annually. 'Bug' was a computer term derived from a moth. Internet users blink an average of 7 times per minute, while the average person blinks 20 times per minute.

What kind of device can monitor a connection at the demarc but cannot interpret data?.

Answers

Smart jack device can monitor a connection at the demarc but cannot interpret data.

What is a smart jack used for?Smart jack is a specific network that is used between the interface of the internal network and the service network provider. It can monitor a connection at the demarc but cannot analyze the data.In essence, this gadget is utilized for protocol and code conversion.In addition to serving as a demarcation point between the inside and outside wiring, smart jacks are not employed to analyze data. In order to convert signals, a smart jack may convert codes and protocols (such as framing types) to the format required by the client equipment.Similar to what a repeater does, it may buffer and/or regenerate the signal to make up for signal deterioration caused by line transmission. The sophisticated and clever equipment known as Smart jack is situated directly between the customer's premises and the telephone company's demarcation line.Since it contains a smart function to test a connectivity check, smart jack differs from the type of device we typically refer to as NID.

To learn more about smart jack refer

https://brainly.com/question/28546834

#SPJ4

write an algorithm and a flow chart to determine the grades of students using "if and else" statement

Answers

The algorithm would look follows:

What is an algorithm?

An algorithm is a set of instructions, or a set of rules to adhere to, for carrying out a particular task or resolving a particular issue. In the ninth century, the term algorithm was first used. There are algorithms everywhere around us. The process of doing laundry, the way we solve a long division problem, the ingredients for baking a cake, and the operation of a search engine are all examples of algorithms. What might a list of instructions for baking a cake look like, similar to an algorithm?

Algorithm to find the grades of students whether pass or fail:

1)Start

2)Enter the marks obtained by the student

2)If the student has more than 70 marks it is a pass

4)else the student is fail

5)End

I have attached the snapshot of the flow chart

Therefore knowing the basic algorithm can help you to tackle the typical problems

To know more about algorithms  follow this link

https://brainly.com/question/24953880

#SPJ9

which data collection feature allows you to control the amount of time user-level and event-level data is stored by analytics?

Answers

Data retention period is the data collection feature allows you to control the amount of time user-level and event-level data is stored by Go*gle Analytics.

What is Data Retention?

Data retention, also known as record retention, is the practice of storing and managing data and records for a set period of time.

A business may need to retain data for a variety of reasons, including the need to maintain accurate financial records, to comply with local, state, and federal laws, to comply with industry regulations, to ensure that information is easily accessible for eDiscovery and litigation purposes, and so on.

To meet these and other business requirements, every organization must develop and implement data retention policies.

What Is a Data Retention Period?

A data retention period is the length of time that an organization keeps information. Different types of data should be kept for different amounts of time.

Data should only be kept for as long as it is useful, according to best practices. However, certain laws and regulations have specific requirements for data retention periods, so do your research before deciding on a retention period for a data retention policy.

To know more about Go*gle Analytics, visit: https://brainly.com/question/13234037

#SPJ4

our data analytics team often uses both internal and external data. describe the difference between the two.

Answers

INTERNAL VS. EXTERNAL DATA

Briefly-
• Internal data is information generated from within the business, covering areas such as operations, maintenance, personnel, and finance.
• External data comes from the market, including customers and competitors. It’s things like statistics from surveys, questionnaires, research, and customer feedback.

which part of a mac address is unique to each manufacturer? the physical address the device identifier the oui the network identifier

Answers

A MAC address is 48 bits long. And those 48 bits are divided into two separate groups of 24 bits each. The first 24 bits are specific to the manufacturer or vendor. These bits are known as the organizationally unique identifier, or OUI.

What is a MAC address?

A Media Access Control address (MAC address) is a hardware identifier that allows each device on a network to be identified uniquely. It is primarily assigned by the manufacturer. They are frequently found on the network interface controller (NIC) card of a device. MAC addresses are also known as burned-in addresses, Ethernet hardware addresses, hardware addresses, or physical addresses.

MAC addresses never change on their own because they are assigned to NICs or other hardware. (However, many network interfaces allow for MAC address changes.)

To know more about MAC address, visit: https://brainly.com/question/13267309

#SPJ4

an armstrong number is an n-digit number that is equal to the sum of the nth powers of its digits. determine if the input numbers are armstrong numbers.

Answers

An integer with three digits is considered to be an Armstrong number if the sum of its digits' cubes is an integer.

What is Armstrong Number?Many newcomers are curious in the Armstrong number, often known as the narcissist number. Because of how the number acts in a certain number base, it is particularly intriguing to novice programmers and those learning a new programming language. According to mathematical number theory, the Armstrong number is any number that, when each of its digits is raised to the power of the number of digits in the number, forms the total of the same number in any given number base. In any given number system, a number is said to be an Armstrong number if the sum of the digits raised to the power of the number of digits in the number and added together equals or equals the original number.

To Learn more About  Armstrong number refer to:

https://brainly.com/question/19132356

#SPJ4

Which layer of the network model includes specifications for cables and connectors and how signals are sent over these connections?.

Answers

The physical layer specifies how a device and a transmission medium, like a copper or optical cable, are related.

What do you mean by the term physical layer?

The method for transmitting a stream of unprocessed bits over a physical data link connecting network nodes is defined by the physical layer. In order to turn the bitstream into a physical signal that can be transmitted over a transmission medium, it may be divided up into code words or symbols.

What is bitstream?

Binary information bits (1s and 0s) that can flow from one device to another are referred to as bitstreams. Applications involving computers, networking, and audio employ bitstreams.

The connection between a device and a transmission medium, like a copper or optical cable, is established by the physical layer. Pin layout, voltages, cable specifications, hubs, repeaters, network adapters, host bus adapters (HBA used in storage area networks), and more are all covered in this.

Learn more about physical layer click here:

https://brainly.com/question/26500666

#SPJ4

Bob silver loves playing the world of warcraft game in which he has the capability to create his own character and even his own lifelike environment. Which ai system would you categorize world of warcraft as?.

Answers

Bob loves playing the world of warcraft games in which he has the power or capability to create his own character even his own lifelike environment. The AI system which categorizes this world of warcraft is virtual reality. So the correct option is Virtual Reality.

Virtual reality is the use of computer technology to create simulated environments. Virtual reality allows users to experience her in three dimensions. Users are immersed and interacting with a 3D world instead of looking at a screen in front of them. Therefore, in Virtual Reality AI Gaming, gamers can create their own character and life-like environment.

While the other options are incorrect because a Multi-agent system is a computer system composed of multi-agents to solve an impossible problem. Expert systems are AI system that gives prediction based on the given data. While fuzzy logic systems are AI systems that resemble human thinking.

The complete question is given below:

Bob silver loves playing the world of warcraft games in which he has the capability to create his own character and even his own lifelike environment. Which ai system would you categorize the world of warcraft as?

Multi-agent systemExpert systemVirtual realityFuzzy logic system

You can learn more about virtual reality at

https://brainly.com/question/13269501

when working in virtual desktops in windows 10, what feature will allow you to see a tile representing each virtual desktop, as well as all open apps?

Answers

With the feature, you can view all open apps in task view along with a tile for each virtual desktop.

What is meant by task view?Task View is a task switcher and virtual desktop system that was introduced in Windows 10 as one of the first new features. A user can use Task View to quickly locate an open window, quickly hide all windows and display the desktop, and manage windows across multiple monitors or virtual desktops.If you're not familiar with the Task View icon, it looks like a stack of boxes on the right with a scroll symbol. It should be on the taskbar's left side, to the right of the search bar.Launch Task View: Tab + Windows logo key Display and hide the desktop by pressing the Windows logo key + D.

To learn more about task view refer to:

https://brainly.com/question/17745928

#SPJ4

What ip feature limits how many times a packet can bounce between the two routers?.

Answers

Hop count is referred to the ip feature that a packet can bounce between the two routers

What is hop count?

Depending on the routing protocol, this may include the source and destination, meaning the first hop is counted as hop 0 or hop 1. The hop count describes the number of network devices through which data passes from source to destination.

Maximum hop count :

The number of routers a packet must pass through before reaching its destination is indicated by the hop count, which is given in a decimal range from 1 to 15. It could be challenging to connect to a slower network represented by a high hop count because the maximum hop count is 15.

Hence to conclude hop count feature limits a packet bounce

To know more on hop count follow this link

https://brainly.com/question/25823209

#SPJ4

you are building a new computer and have purchased a motherboard that includes four built-in sata connectors. which of the following most accurately lists the maximum number of sata devices you can connect to the motherboard using the integrated ports?

Answers

Through line biomechanics concentration and observation magic if International Society of Biomechanics in sports.

What is "International Society of Biomechanics in sports"?

The recently developed professional association in biomechanics is the "International Society of Biomechanics in sports".It is the professional association in bio-mechanics.

It is an international society which is dedicated to bio-mechanics to sports. The main purpose of the society is to understand and study the human movement and its relation to sport bio-mechanics. They provide information regarding  bio-mechanics in sports.

Therefore, Through line biomechanics concentration and observation magic if International Society of Biomechanics in sports.

Learn more about biomechanics on:

https://brainly.com/question/13898117

#SPJ1

you have set up your android phone using one account and your android tablet using a second account. now you would like to download the apps you purchased on your phone to your tablet. what is the best way to do this?

Answers

Touching and holding on an empty area of your Home screen will allow you to recover lost or deleted Android app icons or widgets the simplest method possible.

Explain about the Android phone?

A powerful, cutting-edge smartphone known as an Android phone utilizes the Android operating system (OS), Surprisingly, Android phones account for almost 70% of all phones purchased worldwide, while Apple's iPhones, which use the iOS operating system, only account for 27%.

However, in general, iOS devices outperform most Android phones at similar price points in terms of speed and smoothness.

Smartphones, on the other hand, are a subcategory of phones that offer more sophisticated functionality beyond the standard call and message capabilities. Android, on the other hand, is an operating system that is mostly used in smartphones and is not exclusive to any one type of phone.

To learn more about Android phone refer to:

https://brainly.com/question/28048405

#SPJ4

are search engines that select several very useful databases that are available on the web and conduct your search on those databases.

Answers

Users of websites and apps today rely heavily on search engine databases.

What is search engine?

Performance standards for websites and applications are always rising. When it comes to user experience, even small businesses are held to the same standards as tech giants.

Users anticipate being able to swiftly and easily find the information they require on your website or in your app.

This book is all about search engine databases, why they are useful for achieving the aforementioned objectives, and how to start using them to build a trustworthy and well-organized data collection.

Therefore, Users of websites and apps today rely heavily on search engine databases.

To learn more about database, refer to the link:

https://brainly.com/question/29412324

#SPJ1

Other Questions
A glitter glue recipe takes a mixture of 15 cup of glitter to 25 cup of glue. For A, how many cups of glitter are used for 1 cup of glue? For B, how many cups of glitter glue is made with 1 cup of glue?A. cups of glitterB cups of glitter glue why do you think composers of the enlightenment used the sonata- allegro form so pervasive throughout the eighteenth century? the gap offers higher-end professional clothing and prices at banana republic and lower-end casual, everyday clothing at lower prices at old navy. what type of product lengthening strategy does this represent? How did Henry Ford affect industry in general in Detroit?Other companies moved to Detroit because so many potential employees lived there.Other companies moved to Detroit in an attempt to steal business from Ford.Many companies in Detroit closed down because they could not compete with Ford.Many companies left Detroit because they could not find enough employees there. find the design stage uncertainty in the measurement when measuring a relatively higher pressure of 303 kpa quizzlet you are on a two-way street, stopped at an intersection. can you legally turn left on a red light into a one-way street? what percent is 1/3 of a circle Researchers who examined health records of thousands of males found that men who died of myocardial infarction (heart attack) tended to be shorter than men who did not. 1) Is this an experiment? If not, what kind of study is it?2) Is it correct to conclude that shorter men are at higher risk of dying from a heart attack? Explain.A. Yes, since the result is considered to be statistically significant.B. No, since there may be confounding variables interfering with the treatment, such as patient age or weight.C. No, since it cannot be determined which of the subjects will die from heart attacks in the future.D. No, since there may be lurking variables, such as patient age or weight. christopher has chosen a settlement option for his insurance plan in which the arrangement is a long commitment. the beneficiary will receive the interest on the investment and there will be administrative fees associated with this option. which settlement option did christopher choose? 6. ABC YWZx=___ AC= ____ T=____ WZ= ___ WY=____AB=____ m7. ABC ZYWX=___ YZ=____ T=____ WZ=___ WY=___ in order for an animal to provide enough respiratory gas exchange and nutrients to the its entire body, animals have evolved: What mass of BaCl2 is needed to make 0.500 L of a 0.250 M BaCl2 solution ? A. 0.125g B. 2.00g C. 21.6g D. 26.0g Ms. jameson is using "sonnet 18" by william shakespeare to teach her students how to analyze a rhyme scheme. so long as men can breathe or eyes can see, so long lives this, and this gives life to thee. which is the correct rhyme scheme for these lines within the poem as a whole? aa aaa ab ab Which Southeast Asian country that is depicted on the map was the center of a war in which the USA was attempting to stop the spread of communism?A) CambodiaB) IndonesiaC) VietnamD) Myanmar Advertising, personal selling, publicity, and sales promotion are collectively known as the?. Consider the quadratic function f(x) = x2 5x + 12. Which statements are true about the function and its graph? Select three options. The value of f(10) = 82 The graph of the function is a parabola. The graph of the function opens down. The graph contains the point (20, 8). The graph contains the point (0, 0). If a hydrate of the formula mclyxh2o decomposes when heated to produce hcl, what change would you expect to occur when a piece of blue litmus paper is held in the path of the vapor released?. A toy rocket is shot vertically into the air from a launching pad 7 feet above the ground with an initial velocity of 72 feet per second. The height h, in feet, of the rocket above the ground at t seconds after launch is given by the function h(t)=-16 t+72 t+7. How long will it take the rocket to reach its maximum height? What is the maximum height?The rocket reaches its maximum height at ______ second(s) after launch.(Simplify your answer.)The maximum height reached by the object is ______feet.(Simplify your answer.) What event must take place during interphase before a cell proceeds to division?. a consists of an adult or couple who lives with children who are not their biological children.