The data dictionary acts as a repository of metadata that explains the nature and properties of the data stored in each field or column of the database, enabling effective management, utilization, and interpretation of the database's contents.
The data dictionary, also known as the metadata repository or data catalog, is an essential component of a database management system (DBMS). It serves as a centralized source of information about the database's structure, organization, and data elements.
The data dictionary includes detailed descriptions of various database objects, such as tables, views, columns, indexes, constraints, and relationships. Specifically, for each field or column in the database, the data dictionary provides information on the data type, size, format, constraints, and other relevant attributes.
By documenting the characteristics and semantics of the database's data elements, the data dictionary helps users, developers, and administrators to understand and interpret the data stored in each field. It facilitates data governance, database administration, application development, and data integration tasks by providing a comprehensive reference for the database's structure and data definitions.
Additionally, the data dictionary supports data quality efforts, data lineage analysis, impact analysis, and other data management activities by providing insights into the data's meaning, usage, and dependencies within the database.
To learn more about databases Click Here: brainly.com/question/30163202
#SPJ11
What process renders high-level programming code into usable code for the CPU?
Answer:
Compilation
Explanation:
The compiler links your code and assembles it and compiles it to a binary file. For more information you can find it on or the internet
Which composer below was not part of the classical period?
A. Beethoven B. Bach
C. Mozart
Explanation:
B. Bach
Thanks for your point
your network contains an active directory domain. the domain contains 2,000 computers that run windows 10. you implement hybrid microsoft azure active directory (azure ad) and microsoft intune. you need to automatically register all the existing computers to azure ad and enroll the computers in intune. the solution must minimize administrative effort. what should you use
Deploying Windows Autopilot profile. Using deployment profiles for Autopilot, the devices are set up. Up to 350 profiles may be made for each tenant.
What is a directory domain?Within a Microsoft Active Directory network, an Active Directory domain is a group of objects. An object can be a single person, a team, or a piece of hardware, like a computer or printer. Each domain has a database that stores data on object identities. In a hierarchical structure called a directory, information about network objects is kept. A directory service, like Active Directory Domain Services, gives network users and administrators the means of storing and making directory data accessible.A domain is a grouping of connected users, devices, and other AD objects, including all the AD objects belonging to your business.To learn more about directory domain refer :
https://brainly.com/question/24215126
#SPJ4
why is computer virus called destructive program
Answer:
A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
Viruses which are the most commonly-known form of malware and potentially the most destructive. A virus can do anything from erasing the data on a computer to hijacking a computer to attack other systems, send spam, or host and share illegal content.
Explanation:
The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally because they are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Some viruses wreak havoc as soon as their code is executed, while others lie dormant until a particular event (as programmed) gets initiated, that causes their code to run in the computer. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected email attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it must be authenticated. authentication can be done by
Authentication can be done by the issuer of the security.
What do you mean by authentication?
Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.
Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.
To learn more about authentication
https://brainly.com/question/28240257
#SPJ4
When tissue is damaged through trauma or ____________ , chemicals are released from the injured cells. these chemicals trigger the events leading to ____________ , including the movement of white blood cells from the vasculature into the damaged tissue.
Chemicals released from damaged cells trigger inflammation and the migration of white blood cells.
What is the role of chemicals released from damaged cells in triggering inflammation and the migration of white blood cells?When tissue is damaged, whether due to trauma (such as physical injury) or inflammation (such as in response to an infection or autoimmune response), the damaged cells release various chemicals known as inflammatory mediators.
These mediators include substances like histamine, cytokines, and prostaglandins. These chemicals serve as signals to the body's immune system, indicating that there is tissue damage and triggering an inflammatory response.
One of the key events in inflammation is the recruitment of white blood cells, particularly neutrophils and macrophages, to the site of tissue damage.
These immune cells are responsible for fighting off pathogens, removing debris, and promoting tissue repair.
The chemicals released from the damaged cells facilitate the movement of these white blood cells from the blood vessels (vasculature) into the damaged tissue, where they can carry out their functions.
Overall, the release of chemicals from injured cells and the subsequent recruitment of white blood cells are crucial components of the body's response to tissue damage and inflammation.
Learn more about trigger inflammation
brainly.com/question/9308143
#SPJ11
Which two statements show cultural effects of computers and the Internet?
O A. Melissa says "LOL" instead of laughing at a joke her friend told.
B. Jake uses the Internet to meet people from other countries online,
C. A city's traffic lights are controlled by a computer algorithm to
help improve traffic
D. A company uses servers instead of paper databases to store
sales data
Answer:
I think it is A, Melissa says "LOL" instead of laughing at a joke her friend told.
Jake uses the Internet to meet people from other countries online, and a city's traffic lights are controlled by a computer algorithm to help improve traffic are the statements that show cultural effects of computers and the Internet. The correct options are B and C.
What is internet?The internet is a worldwide network of interconnected computers and servers that allows users to share, exchange, and communicate with one another.
Jake uses the Internet to connect with people from other countries: The internet has facilitated communication and the exchange of ideas between people from various cultures, leading to a greater understanding and appreciation of different cultures.
A computer algorithm controls traffic lights in a city to help improve traffic flow: This is an example of how technology is being used to make daily life more efficient and sustainable.
Thus, the correct options are B and C.
For more details regarding internet, visit:
https://brainly.com/question/13308791
#SPJ7
45 points
Multiple Choice: Choose the answer that best fits each statement below.
______ 5. Which of the following can be found by clicking the AutoSum drop‐down?
a. Average
b. Min
c. Sum
d. All of the above
______ 6. Which option is used to prevent a cell reference from changing when a formula is copied to
another location?
a. Named ranges
b. Absolute cell reference
______ 7. An advantage to defining range names is:
a. Selections can be larger
b. Selections can be any format
c. Name ranges are easy to remember
d. Name ranges clear cell contents
True/False: Answer True or False for each statement below.
______ 8. You can only increase or decrease the decimal places by two.
______ 9. The comma style allows you to format with a thousands separator.
______ 10. Excel does not allow you to copy and paste formulas with AutoFill.
Answer:
5 its either a or b and 6 is b 7 is d and 8 t 9 f 10 f
Explanat ion:
Which of the following is NOT a choice when installing a new CA?
Root CA
Standalone CA
Bridged CA
Enterprise CA
If someone asks which of the following is NOT a choice when installing a new CA, the correct answer would be Bridged CA.
When installing a new CA, the user is typically presented with several choices to select from, including Root CA, Standalone CA, Bridged CA, and Enterprise CA. However, the option of "Bridged CA" is not typically presented as a choice when installing a new CA. A Bridged CA is a type of CA that is used specifically in a Microsoft Hyper-V environment to provide secure certificate-based authentication between virtual machines. It is not a general option that would be presented to users during the installation of a new CA. Rather, it is a specialized configuration that would only be relevant in specific scenarios. Therefore, if someone asks which of the following is NOT a choice when installing a new CA, the correct answer would be Bridged CA.
Learn more about installing CA here:
https://brainly.com/question/31765815
#SPJ11
SQL
create table Customer(
cus_code integer primary key,
cus_lname varchar(20) not null,
cus_fname varchar(20) not null,
cus_initial char,
cus_areacode integer,
cus_phone integer
);
/*Inserting records into customer table*/
insert into customer values (10010, 'Johnson', 'Alfred', 'A', 615, 8442573);
insert into customer values (10011, 'Dunne', 'Leona', 'K', 713, 8941238);
insert into customer values (10012, 'Smith', 'Walter', 'W', 615, 8942285);
insert into customer values (10013, 'Roberts', 'Paul','F', 615, 2221672);
insert into customer values (10014, 'Orlando', 'Myron', NULL, 615, 2971228);
/*selecting records*/
select * from customer;
create table Invoice(
inv_number integer primary key,
cus_code integer,
inv_date date,
foreign key (cus_code) references customer(cus_code)
);
/*Inserting data into invoice table*/
insert into invoice values (1001, 10011, '2008-08-03');
insert into invoice values (1002, 10014, '2008-08-04');
insert into invoice values (1003, 10012, '2008-03-20');
insert into invoice values (1004, 10014, '2008-09-23');
/*selecting record*/
select * from invoice;
create table vendor (
vend_code integer primary key,
vend_name varchar(30),
vend_contact varchar(30),
vend_areacode integer,
vend_phone integer
);
/*insert data into vendor table*/
insert into vendor values(232, 'Bryson', 'Smith', 615, 2233234);
insert into vendor values(235, 'Walls', 'Anderson', 615, 2158995);
insert into vendor values(236, 'Jason', 'Schmidt', 651, 2468850);
/*selecting records from vendor table*/
select * from vendor;
create table product(
prod_code integer primary key,
prod_desc varchar(50),
prod_price integer,
prod_quant integer,
vend_code integer,
foreign key (vend_code) references Vendor(vend_code)
);
select Product.prod_code,prod_desc,Invoice.Inv_number,inv_date from product,Line,Invoice
where product.prod_code=Line.prod_code and Line.inv_number=Invoice.inv_number
order by product.prod_code;
select Product.p_code,p_descript,Invoice.Inv_number,inv_date from product,Line,Invoice
where product.p_code=Line.p_code and Line.inv_number=Invoice.inv_number
order by product.p_code;
/*Inserting data into product*/
insert into product values (12321, 'hammer', 189 ,20, 232);
insert into product values (65781, 'chain', 12, 45, 235);
insert into product values (34256, 'tape', 35, 60, 236);
insert into product values (12333, 'hanger', 200 ,10, 232);
/*selecting records from product table*/
select * from product;
create table Line (
inv_number integer,
prod_code integer ,
line_units integer,
primary key (inv_number,prod_code),
foreign key (inv_number) references Invoice(inv_number),
foreign key (prod_code) references Product (prod_code)
);
/*Inserting records into Line table*/
insert into Line values (1001, 12321, 1);
insert into Line values (1001, 65781, 3);
insert into Line values (1002, 34256, 6);
insert into Line values (1003, 12321, 5);
insert into Line values (1002, 12321, 6);
/*selecting records from Line*/
select * from Line;
Find the count of distinct vendors that supplied products that are priced lower than 185?
This query will count the number of distinct vendors that supplied products that are priced lower than 185.
What is query?Query is an instruction or command that is used to retrieve specific information from a database. It is most commonly used in Structured Query Language (SQL) to retrieve data from a database, although it can also be used to manipulate or update data in the database. A query can be used to search for specific information within a database or to create reports. Queries can be simple or complex, depending on the amount of data being requested and the amount of data stored within the database.
SELECT COUNT(DISTINCT vend_code)
FROM product
WHERE prod_price < 185;
This query will count the number of distinct vendors that supplied products that are priced lower than 185. It does this by counting the distinct vend_code values from the product table where prod_price is less than 185.
To learn more about query
https://brainly.com/question/30115014
#SPJ4
are those data that visitors and customers produce when they visit a website and click on hyperlinks. group of answer choices cookies erp clickstream data rfid
Clickstream data are those data that visitors and customers produce when they visit a website and click on hyperlinks.
What is a clickstream data analysis?A clickstream is a record of information about mouse or touchpad clicks made by website visitors on computer screens. This kind of data offers a visible record of user behavior together with thorough feedback. 24
Note that the tracking and analysis of website visits is known as clickstream analysis and is a type of web analytics (see separate article). Clickstream analysis commonly uses the Web server log files to monitor and measure website activity, while there are different ways to gather this data.
Hence, option C is correct.
Learn more about Clickstream data from
https://brainly.com/question/28334815
#SPJ1
See full question below
_____ are those data that visitors and customers produce when they visit a website and click on hyperlinks.
1. ERP
2. Cookies
3. Clickstream data
4. RFID
Which of these causes the most collisions?
carrying alcohol on board a vessel
failing to keep a proper lookout
jumping the wake of other vessels
displaying navigation lights incorrectly
Answer:
The answer is "failing to keep a proper lookout".
Explanation:
The theory of collision, especially concerning gas were used to forecast the chemical reaction. It is based on the idea which atoms or molecules of interacting organisms should be mixed or collided. In this question the key cause of collision would be a proper viewpoint is not established, that's why other given choices were wrong.
3. (10 pts) Tommy has an extensive collection of digital photos taken during adventures in nature and
biking trips over the years. They are currently stored on his computer's hard drive. He d like to
make back-up copies of them on USB flash drives. Suppose one flash drive has a 32 GB capacity and each image file has a size of 12.5 MB.
If each flash drive can store/transfer photos at a rate of 60 MBps (Megabytes per second), how long would it take to transfer the entire collection from the hard drive to the flash drive?
If each flash drive can store/transfer photos at a rate of 60 MBps (Megabytes per second) than it will take 30 minutes to transfer the entire collection from the hard drive to the flash drive.
Who has extensive collection of digital photos?Tommy has an extensive collection of digital photos taken during adventures in nature and biking trips over the years. They are currently stored on his computer's hard drive. He d like to make back-up copies of them on USB flash drives. Suppose one flash drive has a 32 GB capacity and each image file has a size of 12.5 MB.
This ultimately implies that, an operating system (OS) acts as an interface (intermediary) between an end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions, including the management of the random access memory (RAM).
Therefore, If each flash drive can store/transfer photos at a rate of 60 MBps (Megabytes per second) than it will take 30 minutes to transfer the entire collection from the hard drive to the flash drive.
Learn more about flash drive on:
https://brainly.com/question/15263464
#SPJ2
Which of the following is not a valid SQL clause?
TOP
ORDER BY
WHERE
-BOTTOM
The "-BOTTOM" clause is not a valid SQL clause. The correct keyword is "BOTTOM" without the minus sign. The "TOP" clause is used in SQL to specify the number of rows or percentage of rows to be returned.
from a query result. It is commonly used in combination with the "SELECT" statement.
The "ORDER BY" clause is used to sort the result of a query in ascending or descending order based on one or more columns.
The "WHERE" clause is used to filter rows based on specified conditions. It allows you to specify criteria to select only the rows that meet the given conditions.
However, "-BOTTOM" is not a recognized SQL clause. If you intended to specify the last few rows in a result set, you could use the "ORDER BY" clause with "DESC" (descending order) and limit the number of rows using the "TOP" clause or equivalent syntax provided by the specific database system.
Learn more about SQL here:
https://brainly.com/question/31663284
#SPJ11
Why do you think Beyonce's performance of the Negro National Anthem was so impactful at
Coachella?
Answer:
it showed a movement of black rights and brought awareness to it
write java code to create a generic class that stores two generic objects and name the generic class after your last name.
The java code that creates a generic class that stores two generic objects and name the generic class after your last name is
public class MyClass<T1, T2> {
private T1 object1;
private T2 object2;
public MyClass(T1 obj1, T2 obj2) {
this.object1 = obj1;
this.object2 = obj2;
}
public T1 getObject1() {
return this.object1;
}
public T2 getObject2() {
return this.object2;
}
public void setObject1(T1 obj1) {
this.object1 = obj1;
}
public void setObject2(T2 obj2) {
this.object2 = obj2;
}
}
Generics are a generic programming feature that was added to the Java programming language in version J2SE 5.0 in 2004.
They were created to supplement Java's type system by allowing "a type or method to operate on objects of various types while providing compile-time type safety."
Learn more about Generic Class:
https://brainly.com/question/12995818
#SPJ1
Edhesive unit 4 test answers
Answer:
Can you show the questions?
Explanation:
Which of these is NOT a way that technology can solve problems?
Group of answer choices
sorting quickly through data
storing data so that it is easily accessible
making value judgments
automating repetitive tasks
Answer:
making value judgements
Explanation:
honestly this is just a guess if there is any others pick that but this is just what I'm thinking
Easy 10 point but can u plz help me
Answer:ITS TRUe
Explanation:there ya go :^
What is the role of MIB when implementing SNMP?
Management Information Base (MIB): It is a collection of data objects that are organized hierarchically and defined by SNMP. It is a virtual information store that allows information about networked devices to be retrieved. The information collected by SNMP is stored in the MIB.
SNMP requires the MIB to function. The data collected by SNMP is used to update the MIB, and the MIB is used to present data to the SNMP. In this way, the MIB serves as the SNMP's primary source of information.
Learn more about SNMP at:
https://brainly.com/question/32385622
#SPJ11
Write a program that will ask the user to enter the amount of a purchase. The program should then compute the state and county sales tax. Assume the state sales tax is 5 percent and the county sales tax is 2.5 percent. The program should display the amount of the purchase, the state sales tax, the county sales tax, the total sales tax, and the total of the sale (which is the sum of the amount of purchase plus the total sales tax). Hint: Use the value 0.025 to represent 2.5 percent, and 0.05 to represent 5 percent. Miles-per-Gallon
Answer:
purchase_amount = float(input("Enter the amount of a purchase: "))
state_sales_tax = purchase_amount * 0.05
country_sales_tax = purchase_amount * 0.025
print("The amount of the purchase is " + str(purchase_amount))
print("The state sales tax is " + str(state_sales_tax))
print("The county sales tax is " + str(country_sales_tax))
print("The total sales tax is " + str(state_sales_tax + country_sales_tax))
print("The total of the sale is " + str(purchase_amount + state_sales_tax + country_sales_tax))
Explanation:
*The code is in Python.
Ask the user to enter purchase amount
Calculate the state sales tax, multiply purchase amount by 0.05
Calculate the county sales tax, multiply purchase amount by 0.025
Calculate the total sales tax, sum the state sales tax and county sales tax
Print the amount of the purchase, state sales tax, county sales tax, total sales tax and total of the sale
The program is a sequential program, and does not require loops or branching.
The program in Python, where comments are used to explain each line is as follows:
#This gets input for the purchase amount
amount = float(input("Amount: "))
#This calculates the state sales tax
stateTax = amount * 0.05
#This calculates the county sales tax
countyTax = amount * 0.025
#This prints the purchase amount
print("Purchase Amount:" ,amount)
#This prints the state sales tax
print("State Sales Tax:",stateTax)
#This prints the county sales tax
print("County Sales Tax:",countyTax)
#This calculates the total tax
totalTax = stateTax + countyTax
#This prints the total sales tax
print("Total sales tax:",totalTax)
#This calculates the total sales
totalSales =amount + totalTax
#This prints the total sales
print("Total sales:",totalSales)
Read more about sequential programs at:
https://brainly.com/question/23275071
In 1943 Thomas Watson, chairman of IBM, said, "I think there's a world market for maybe five computers."
In 1943, the chairman of IBM, Thomas Watson, made the statement, "I think there's a world market for maybe five computers." It is often repeated as an illustration of how short-sighted people can be when it comes to anticipating technological advancements.
However, Watson's declaration, like many such predictions, has been misunderstood. Watson was not predicting the future of computing, but rather saying that computers were incredibly expensive and complicated to construct, and the world's demand for computers, given their prohibitive cost, might only be for a few of them.
Even so, Watson's statement is amusing because it exposes our propensity for underestimating the impact of technology in the future. By the mid-twentieth century, computers were already being utilized in scientific and military operations. They would go on to revolutionize industry and commerce in the last quarter of the twentieth century.Watson's prediction was wrong.
Despite the fact that computing capabilities have become much more powerful and sophisticated since Watson's prediction, the world market for computers is still increasing, as we require ever more computing power to fuel everything from e-commerce to cloud computing. Therefore, we must acknowledge that Thomas Watson's forecast about computing was severely short-sighted and optimistic.
Know more about the cloud computing.
https://brainly.com/question/19057393
#SPJ11
Which examples best demonstrate likely tasks for Logistics and Inventory Control workers? Check all that apply.
Meg operates a machine that packages products.
Darryl monitors the production schedule for a factory.
Trudy tests a piece of machinery to identify a problem.
Pearl purchases manufacturing equipment.
Gustavo designs a part for an engine.
Sheldon inspects a factory to ensure it is not causing pollution.
Answer:
1,2,4
Explanation:
Answer:
Explanation:
Hope this helps, have a great day (;
Please compose an email back to your client mr. smith, letting him know we are unable to secure the requested reservation at eleven madison park tonight for a party of 2 at 6pm.
The compose an email back to your client Mr. smith is written above,
Mr Smith,
Manager Venus PLC.
Dear sir,
Issue with requested reservationI wish to inform you concerning the requested reservation for the eleven Madison park tonight for a party of 2 at 6pm.
The place has been taken by another person as at that time and our request was said to be made too late but there are other options that have been given for that time but in a letter date.
We are sorry for the inconveniences this may have cause you and we hope to meet you to discuss the way forward.
Thanks for your continuous patronage,
Mr. Rolls.
Manager Madison park
Learn more about Email from
https://brainly.com/question/24688558
#SPJ1
Former CIA employee and NSA contractor, ____________ is seen by many as either a whistle-blowing hero or a traitorous villain. This person gathered sensitive digital documents from U.S., British, and Australian agencies, and leaked them to the press, exposing the extent of government surveillance efforts.
Learn more:
Edward Snowden: brainly.com/question/3426041
What is the most common knowledge computer programmers need in order
to write programs?
O A. The full history of the computer and its development
B. How to build computers from basic components
C. A high-level programming language, such as Swift or JavaScript
D. How a computer converts binary code into a programming
language
Answer:
C
Explanation:
The Answer you're looking for is:
C. A high-level programmings languages, such as Swift or JavaScript
Not necessary to read all of it you can skip this part.10 skills you need for Computer Programing:
#1 Knowledge about programming languages:
Although it is not necessary for a programmer to know every programming language, at least they can learn two to three. These may in turn cause to increase their chances of more job opportunities
#2 Knowledge about Statistics and mathematics:
A programmer should also have a sound knowledge of statistics. They must excel in it so as to further increase their chances of future career opportunities. That also helps computer programmers to build skills.
A programmer must also be advanced in the field of maths to understand all the aspects of programming.
He must have knowledge of basic algebra, arithmetic, and other mathematical operations to make his base strong in programming.
#3 Inquisitiveness:
A programmer should also know how to deal with certain problems. They should also know how to find ways to overcome it in an efficient way
#4 Communication skills:
A programmer should also have a good hold of communication skills. This may lead to having good socialization with their peer members and create a stable bonding with them in order to work efficiently.
Sharing ideas with peer members may also help in finding the solutions in a shorter duration.
#5 Writing skills and Speaking skills
A programmer should also have better writing skills in order to succeed in his programming field. He must have a sound knowledge of all the expressions, symbols, signs, operators, etc.
This knowledge will help them languages in enhancing their skills and knowledge. A programmer should also have a sound knowledge of speaking skills and a high level of confidence.
#6 Determination and Dedication:
A programmer should also be determined towards his work. He must do his work efficiently with hard work and dedication throughout to get success in every field.
It is also important that he should be honest towards his work and do his job with perfection.
#7 Staying organized:
The programmer should also be organized in his work. He must organize every kind of complex work into simpler ones in order to complete it with ease and with higher efficiency.
#8 Paying attention to meager details:
The programmer should also keep in mind that while doing programs they must pay attention to small details. This will in turn ensure that the program runs well.
#9 Negotiation and persuasion skills:
A programmer should also be good at negotiation and persuasion skills in order to solve every problem with ease.
#10 Extra skills:
A programmer should also have extra skills like knowing about Microsoft Excel and creating websites and data.
Furthermore, he must also know how to handle large amounts of data to get better at programming. This will increase his chances of achieving better job opportunities in the future.
A programmer must also be better at critical thinking and logical reasoning to solve complex issues with ease and efficiency.
Proof Of Answer:
The image below hope this helped you.
A tornado destroyed many
CORRECT ANSWER GETS BRAINLIEST PLEASE HELP !
structures in a small Texas
town. Which type of engineer should be called in to collect
evidence in order to prevent this level of damage in the future?
A.chemical engineer
B.biomedical engineer
C.materials engineer
D.forensic engineer
Answer:
D is your answer because I'm an expert
Answer:
D. forensic engineer
Explanation:
Because I know the answer I got it right
Which type of chart or graph uses vertical bars to compare data? a Column chart b Line graph c Pie chart d Scatter chart
Answer:
Column Chart
Explanation:
how to play m.i.n.e.c.r.a.f.t
wrong answers only
if you do not like this question do not comment thank you
Answer:
Mine stone with your fist.
Loot village for potato.
Go to nether for portal pieces
Find end with portal.
Defeat enderdragon with potato.
Explanation:
:)
Cisco uses the term the power of in-person to describe the ability of what technology to improve access to subject matter experts and to open doors for small business people?.
Cisco refers to the capacity of Telepresence technology to provide access to subject matter experts and to open doors for small business owners as the "power of in-person."
CISCO stands for Commercial & Industrial Security Corporation.
The Commercial & Industrial Security Corporation (CISCO), then known as Certis, was established in 1958 as the Police Force's Guard and Escort Unit.
The largest segment of Cisco is "Infrastructure Platforms," which is expected to generate approximately $27.1 billion in sales for the company's fiscal year 2021. Cisco's "Infrastructure Platforms" division includes switching, routing, wireless, and data centre equipment among other networking technology solutions.
Internationally active American technology business Cisco Systems is best recognised for its computer networking solutions.
The size, range, and connectivity requirements of the four types of wireless networks—wireless LAN, wireless MAN, wireless PAN, and wireless WAN—vary.
Learn more about Cisco:
brainly.com/question/27961581
#SPJ4
Telepresence is a technology that Cisco refers to as having "the power of in-person" in order to highlight its capacity to enhance access to subject matter experts and open doors for small company owners.
a technique that makes it possible for someone to behave as though they were genuinely present in a remote or virtual environment. It is based on an open source program that enables you to run a single service locally while coupling it to another Kubernetes cluster. Cisco telepresence devices make it easier to physically collaborate by eliminating distance barriers.
Learn more about Cisco here
brainly.com/question/27961581#
#SPJ4