Match up each definition and term. Please help asap

Match Up Each Definition And Term. Please Help Asap

Answers

Answer 1

Answer:

Query - Definition - Search by specific information Example - Find T-shirt in a specific size

Flat File Database - Definition - Simple database where each row is a record Example - Excel file of names and addresses

Fields - Definition - Different types of data for each record (columns) Example - Type of clothing, colour, size, price

Sort - Definition - Show records in different order based on its fields Example - Arrange all records alphabetically by colour

Record - Definition - Main item in a list (row) Example - Jeans

Text Field - Definition - Any number, letter, and all symbols Example - Levi's 518

Date Field - Definition - Date in a specific format Example - 2020-06-30

TIME Field - Definition - Any format of a timestamp Example - 10:42 PM

Graphic Field - Definition - Any kind of image Example - Logo

Calculated Field - Definition - Contains a formula to work something out Example - Length of time item has been in inventory

Number Field - Definition - Contains numbers that may be used in future calculations Example - $237.42

Brainlist Pls!


Related Questions

if you bet and another person bets do you get the money you bet and the money the other person bets?
example : say you bet on a computer game and your sister bets $5 and you bet $10 that you will win. Do you get the $10 and the $5 if you win from your sister or just the $5?​

Answers

Answer:

I believe you would get both because since you both did a bet and you won, that would mean you should automatically get both of what yall put down.

Explanation:

I think that's what should happen but I'm not sure though.

data in ai uses what >

Answers

Answer:

Explanation:

artificial intelligence describes the ability of computers to act like humans

75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware

Answers

Malwares are intentional attacks on a system with the intent to do harm.

Cyberthreats may be intentional like a virus or unintentional like a fire or human error

Hope that helps!

How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object

Answers

Answer:

as an object in the hierachy panel

A __________ structure can execute a set of statements only under certain circumstances. a. sequence b. circumstantial c. decision d. boolean

Answers

A structure which can execute a set of statements only under certain circumstances is: C. decision.

What is a decision structure?

A decision structure can be defined as a type of structure that is used in computer programming or mathematical operations to execute a set of statements only under certain circumstances.

This ultimately implies that, a decision structure would only execute a set of statements provided that they meet the conditions that are set by the programmer such as under certain circumstances.

Read more on decision structure here: https://brainly.com/question/13297323

how does computer science help in dance

Answers

Do not troll, I will be writing you up.

What element allows text to be displayed in italics, which means the words are slanted to the right?

a
The < crooked > element

b
The < italic > element

c
The < em > element

d
The < slant > element

Answers

Answer:

the answer is the italic element

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode

Answers

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.

How is packet sniffing done?

Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.

Packet sniffing tools such as WireShark and SmartSniff are examples.

Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.

For further details about Packet Sniffing click here:

https://brainly.com/question/14417640

#SPJ4

How do IT Support professionals measure success? Choose all answers that apply. You will get credit for all answers that are correct. Select 4 correct answer(s)
Using the SWOT analysis
Creating a C-Corporation
Customer satisfaction
Saving money in the bank
Call volume
Resolution time
Response time​

Answers

IT Support professionals measure success through;

Using the SWOT analysis.Customer satisfaction.Resolution time.Response time​.

How do One measure success in information technology?

IT success is known to be one that can be achieved by excelling in a lot of aspects such as:

Operational excellence.Delivering new functionality. keeping costs in line, etc.

By using the four method above, one can know if IT is succeeding or not.

Learn more about success from

https://brainly.com/question/24553900

PLEASE HELP! The variable initials is to be assigned a string consisting of the first letter of the string firstName followed by the first letter of the string lastName. Which of the following assigns the correct string to initials ?

Answers

Answer:

a

Explanation:

Prefix function will grab length character(s) from a string while concat function will join 2 strings into 1.

For initials, use prefix on firstName and lastName to grab the first character. Then join the two together using concat to give the initials:

So the answer is a.

The correct choice to the given function is "initials <--- concat (prefix (FirstName, 1), prefix (lastName, 1))", and its explanation as follows:

Prefix function:

To assign the correct string, we must examine the "cancat ()" and "prefix ()" methods in this problem.

The string consists of the first letter of the string "firstName" followed by the first letter of the string "lastName", is to be set to the variable initials.

Please find the attached file for the complete solution.

Find out more bout the prefix function here:

brainly.com/question/14912735

Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC to DC, and provides the power to drive all the system unit components.

Answers

Desktop computers have a power supply unit (PSU) that is located within the system unit and it provides the electrical power.

What is a desktop computer?

A desktop computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) that is located within the system unit. Also, it plugs into a standard wall outlet (socket), converts alternating current (AC) to direct current (DC), and provides the electrical power that is required to drive all the system unit components.

Read more on computer here: brainly.com/question/959479

In a ________ system configuration, separate information systems are designed and managed by each foreign unit.

Answers

Answer:

In a decentralized system configuration, separate information systems are designed and managed by each foreign unit.

Explanation:

hopes this help (:

What does a black box represent in the system input/output model?.

Answers

Answer:

es un elemento que se estudia desde el punto de vista de las entradas que recibe y las salidas o respuestas que produce, sin tener en cuenta su funcionamiento interno.

Explanation:

What two tabs does Outlook have that PowerPoint does not? View and Send/Receive Folder and Home Folder and Home Send/Receive and Folder

Answers

What are the ribbon tabs in Microsoft Outlook?

The main Outlook menu has a ribbon tab with default commands. File, Home, Send/Receive, Folder, and View are commands on the main ribbon tab. The Backstage view is where you can see information and options pertaining to the user account and settings.

Answer: view and send/recieve

Explanation:

This is an example of what type of formula?
=(D1+D17)

Answers

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

What are functions in excel?

There are different ypes of formula functions in excel such as;

SUMCOUNTCOUNTAIFTRIMMAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

Read more about Excel Functions at; https://brainly.com/question/14042837

You make me the happiest person on earth
i feel joy when i see your face
when i am depressed all i have to do is to think about you and it puts me in a good mood.


do i need to add more to thut

Answers

Answer:

Fixed

Explanation:

I feel joy when I see your face

When I'm depressed all I have to do is to think about you, and it puts me in a good mood.

5. 16 LAB: Brute force equation solver

Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. Given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10.


How do I write this in python?

Answers

Use the knowledge of computational language in python to write a code that force to find an integer solution for x and y .

How to find the solution of an equation in python?

To make it simpler the code is described as:

def brute_force_two_equations(first_values, second_values,

                             max_range=10, min_range=-10):  

for x in range(-10, 10, 1):

   for y in range(-10, 10, 1):

      if a * x + b * y == c and d * x + e * y == f:

          print(x, y)

else:

   print('No solution')

def equation(const1, const2, x, y):

   return const1 * x + const2 * y

def get_three_integers():

   inputs = []

   for i in range(0, 3):

       inputs.append(int(input("Please enter a value: ")))

   return inputs

if __name__ == "__main__":

   print("== First Equation ==")

   first_equation_values = get_three_integers()

   print("== Second Equation ==")

   second_equation_values = get_three_integers()

   solution = brute_force_two_equations(first_equation_values,

                                        second_equation_values)

   if solution:

       print(f"(x, y) {solution}")

   else:

       print("No Solution found")

See more about python atbrainly.com/question/22841107

Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face ​

Answers

Answer:

yes

Explanation:

because the people will be lazy to go and talk to that person instead They will call each other and discuss

If you key a paragraph in uppercase and need to change it to sentence case without having to re-key the paragraph, which option would you use?

Answers

Answer:

I found the answer on quizlet and it said "sentence case" i don't know if its right but hope it helps

10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above

Answers

There are different kinds of applications.  Control objects control the flow of the application.

What works the flow of control in a program?

In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.

They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.

Learn more about application from

https://brainly.com/question/23275071

Two ways of calculating average returns are ______ and ______. Multiple select question. the arithmetic average the progressive average the geometric average the common average

Answers

Answer:

"Geometric Average Return Example. Jennifer has invested $5,000 into a money market that earns 10% in year one, 6% in year two, and 2% in year three. If you were to calculate this using the arithmetic mean return, you would add the rates together and divide them by three, giving you an average of 6%."

Explanation:

Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.

what should chris do to ensure that he can see others’ comments?

a. select show all comments on the review tab.
b. select show no comments on the review tab.
c. select add comment on the review tab.
d select track changes on the review tab.

Answers

Answer:

a. select show all comments on the review tab

Explanation:

Please mark me brainliest if correct

Answer:

A

Explanation:

How could the following line of code be shortened?

average = average + 1

Group of answer choices:

1.average + a

2.average += 1

3.average = + 1

4.average = 1 + average

Answers

Answer:

2

Explanation:

The second option is the only one that will work. The last would work but doesn't make the code any shorter.

Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer program to determine the size of the program. Thus, option B is correct.

What role of line of code if shortened?

It might be argued that writing code in fewer lines rather than several lines is more effective. There are more places for bugs to hide, and it may be more difficult to find them if you have more lines of code.

By enclosing expressions in parentheses, long lines can be split into many lines. These should be used instead of a backslash to continue a line. Ensure that the continuation line is properly indented.

Instead of breaking before a binary operator, it is preferable to break after the operator.The same results can be achieved with fewer lines of code (and perhaps even better) than with many lines of code.

Therefore, The second option is the only one that will work.

Learn more about line of code here:

https://brainly.com/question/18844544

#SPJ2

write the algorithms for the problem How to post a letter ? you can put pictures for the steps ​

Answers

❖ Step 1: Start

❖ Step 2: Write a letter

❖ Step 3: Put in envelope

❖ Step 4: Paste stamp

❖ Step 5: Put it in the letter box

❖ Step 6: Stop

[tex]\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}[/tex] ~←(>▽<)ノ

Please help me!!!!!!!!!!! I really need help

Answers

The answer is a variable

How do you answer this ?

Answers

Answer:

Just put True or false for your answer

Explanation:

Use a Dictionary

Which of the following best describes your sequence of actions when developing a web page?

Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file

Answers

Answer:

I think D

Explanation:

Answer:

B

Explanation:

Saving it, then editing it wouldn't load the new changes

but editing it than saving it, would load the new Changes

What is a critical consideration on using cloud-based file sharing and storage applications.

Answers

Answer:

Determine if the software or service is authorized

Explanation:

:)

How have you improved the technology function to provide the right services at the right price and right level of quality?

Answers

What did you do? Write that as the first part

Website where customers can ask check the ,services and products, Using e-mail to improve customer service and respond to specific needs and More advanced data-gathering techniques, such as customer relationship management software.

How can technology help in customer retention?

Deals can be sent via mobile. Customers would profit from promotions and coupons supplied to their mobile devices.

This behavior is growing more sophisticated and focused. You can send promos on products or services you know a consumer enjoys based on their purchase history.

Thus, Website, E-mail and software can improve the service quality.

For further details about technology, click here:

https://brainly.com/question/16877197

#SPJ4

what does computer graphics mean?​

Answers

Answer:

Computer graphics deals with generating images with the aid of computers

Explanation:

Other Questions
What island country may be first to be completely covered by water?SomaliaTuvaluChadIndonesia Find x in circle O (The figure is not drawn to scale) What type of music were Earl Scruggs and Clarence White known for? folk rock country bluegrass Which lines are parallel? Karen just bought 6 bags of 16 cookies each. She already had 9 cookies in a jar. How many cookies does Karen have now? How much, in total, did Noel spend to cash her three most recent paychecks? Use the graphing calculator to graph the quadratic function y = x2 5x 36. Which value is a solution of 0 = x2 5x 36?9446 Question 7 of 11Two angles in a triangle have measures of 13' and 65.What is the measure of the third angle?A 52B. 102C. 78D. 143SUBMIT This composite figure is created by placing a sector of a circle on a rectangle. What is the area of this composite figure? Show your work. Which of these is true about the Olmec writing system? Mettez les lments dans lordre.Exemple : Habitons/ / sommes / Circle/ cousins/ nous / nous- Nous sommes cousins. Nous habitons Circle.i. tes / vous / vous appelez / polonais / vous / Marekii. Elles / espagnoles / sappellent /sont / Maria et Dolores / ellesiii.Franais / nous appelons / Antoine et La / sommes / nous Media planners seek to reach the largest possible percentage of their target audience with no monetary limitations. a) True b) False True or false? All cells share four key components: plasma/cell membrane, ribosomes, DNA, and cytoplasm.Answer: True Which of the following helped Japans economy recover following World War II? 1984 George orwellWhat difference does Winston notice between Party prisoners and common prisoners? Use evidence from the text in your answer. Read the question and enter your response in the box prcHow do you write an equivalent expression -1/4(-8x+12y Describe the difference between direct and representative democratic governments. the answers r literally were read it Which statement best explains the effect of the Social Security Act in SouthCarolina?The Social Security Act recruited young men to live in army camps and work onconservation projects around South Carolina.Temporary housing was offered to thousands of people in South Carolina as aresult of the Social Security Act.Those South Carolinians who found themselves out of work received a monthlyincome provided by the Social Security Act.The Social Security Act proved to be very important to older South Carolinians,offering them a pension when the state failed to. 50 POINTS!!! In this unit, you learned that the United States has had a two-party political system for much of its history. Although candidates from other parties sometimes win elections at the local level, most elections for state office and the presidency have been dominated in the modern era by candidates from either the Democratic Party or the Republican Party. Do you think this system is fair, or would the nation benefit from a political system in which candidates from other parties had better chances at winning? Do you think the United States would be better off if more political parties were represented at higher levels of government, such as in the House and the Senate? Explain your thinking.