what do yall recommend for a laptop? The Dell xps 13 or MacBook Air? just to give not I'm not used to Apple but what matters to me is what is better in terms of use.​

Answers

Answer 1

Answer:

what is your needs tell us first

Answer 2

Answer:

I got a microsoft surface pro 7 (I think that's what it's called) for Christmas and I live it so far! You can use it as a laptop or disconnect is and use as a tablet!


Related Questions

Computers are used to input, store, process, find and share vast amounts of data and information, and they can do so in
fractions of a second. Discuss the concept of abstraction and abstract data types on computer programming

Answers

The concept of abstraction and abstract data types on computer programming is given below.

The use of abstraction to manage complexity is crucial. When anything is regarded abstractly, just the salient characteristics are highlighted. It is not necessary to recall or even notice the information that is left out.

What is abstraction?

An abstraction of a data structure that merely provides the interface to which the data structure must conform is referred to as an abstract data type. No precise information about how something should be implemented or in what programming language is provided by the interface.

An object's behavior can be described by a set of values and a set of actions, and this behavior is known as an abstract data type (ADT).  The definition of ADT merely specifies the actions that must be taken, not how they must be carried out.

Therefore, List data structures, stack data structures, and queue data structures are examples of abstract data types in data structures. The abstract data type defines a number of legitimate operations that can be performed on a specific data structure.

Learn more about abstraction  from

https://brainly.com/question/7994244
#SPJ1

What are the connections between the following concepts: letter frequency, avalanche effect, correlation between plaintext and ciphertext , and diffusion?

Answers

The Avalanche Effect describes how modifications to the plaintext have an impact on the ciphertext for a good cypher. When the input is only slightly altered, the algorithm generates an entirely different outcome.

Avalanche breakdown definition How does the avalanche breakdown mechanism look like in a diagram?

Avalanche Breakdown:  When a significant reverse voltage is put across the diode, the avalanche breakdown happens. The electric field across the junction grows when the applied reverse voltage is increased. The electrons at the junction are forced by the electric field, breaking their covalent bonds.

Which four fundamental security tenets apply to messages?

Confidentiality, Integrity, Non-repudiation, and Authentication are the four primary security principles that apply to messages.

To know more about Avalanche Effect visit:-

brainly.com/question/29095928

#SPJ1

What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital recording OD. Invention of the microphone O E. invention of the coaxial cable​

Answers

Answer:

D. Invention of the microphone

Explanation:

Indeed, as a result of the invention of the Microphone, stereophonic recordings were made possible. Note that stereophonic recording in simple terms involves the recording of sound by simultaneously using two microphones in other enrich the human hearing experience.

Thus, without such a breakthrough, stereophonic recording technology might have not been facilitated.

1. Star Topology : Advantages 2. Bus Topology : ****************************** Advantages Tree Topology : Disadvantages Disadvantages EEEEE​

Answers

Star Topology (Advantages):

Easy to install and manage.Fault detection and troubleshooting is simplified.Individual devices can be added or removed without disrupting the entire network.

Bus Topology (Advantages):

Simple and cost-effective to implement.Requires less cabling than other topologies.Easy to extend the network by adding new devices.Suitable for small networks with low to moderate data traffic.Failure of one device does not affect the entire network.

Tree Topology (Disadvantages):

Highly dependent on the central root node; failure of the root node can bring down the entire network.Complex to set up and maintain.Requires more cabling than other topologies, leading to higher costs.Scalability is limited by the number of levels in the hierarchy.

Read more about Tree Topology here:

https://brainly.com/question/15066629

#SPJ1

ways that Mass Media has affected your everyday life.

Answers

Answer:

Mass Media affects my life every day right now I am angry and almost embarrassed to say I live in America...

Answer:

Body Image and Self-Esteem.

Consumer Spending Habits.

Values.

Perception of Individuals and People Groups.

Femininity, Masculinity and Relationships.

Explanation:

Select each procedure that could harm the computer and cause it to work improperly.

Answers

There are numerous actions that could potentially harm a computer and cause it to function improperly. Some of the most common ones are given below.

What is the actions that can harm a computer?

Installing untrustworthy software or malware that can damage system files and slow down the computer's performance or steal personal information.Physically damaging the computer by dropping it, spilling liquids on it, or exposing it to extreme temperatures, which can cause hardware components to malfunction or fail entirely.Modifying or deleting system files, which can lead to system crashes and data loss.Overclocking or overheating the computer's CPU or GPU, which can cause hardware damage and potentially void any warranties.Failing to update software regularly, which can leave vulnerabilities in the system that hackers can exploit.Using unlicensed or pirated software, which can introduce viruses and other malware into the system.Opening suspicious emails or clicking on links from unverified sources, which can result in malware infections and data breaches.

Learn more about computer at:

https://brainly.com/question/21080395?

#SPJ1

Help asap PLEASE IM STUCK

Help asap PLEASE IM STUCK
Help asap PLEASE IM STUCK
Help asap PLEASE IM STUCK
Help asap PLEASE IM STUCK

Answers

To sort the filtered data first alphabetically by the values in the Model column and then by icon in the Cmb MPG Icon column so the Signal Meter With Four Filled Bars icon appears at the top, you can follow these steps:

What are the steps!

Select the filtered data.

Click on the "Data" tab in the ribbon.

Click on the "Sort" button in the "Sort & Filter" group.

In the "Sort" dialog box, select "Model" from the "Column" dropdown list and select "A to Z" from the "Order" dropdown list.

Click on the "Add Level" button.

In the "Sort" dialog box, select "Cmb MPG Icon" from the "Column" dropdown list and select "Custom List" from the "Order" dropdown list.

In the "Custom Lists" dialog box, select "Signal Meter With Four Filled Bars" from the list and click on the "Add" button.

Click on the "OK" button in the "Custom Lists" dialog box.

Select "Signal Meter With Four Filled Bars" from the "Order" dropdown list.

Click on the "OK" button in the "Sort" dialog box.

To add subtotals for each change in Model to calculate the average for the Air Pollution Score, City MPG, Hwy MPG, and Cmb MPG, you can follow these steps:

Go to the top of the My Car Data worksheet.

Select the data range.

Click on the "Data" tab in the ribbon.

Click on the "Subtotal" button in the "Outline" group.

In the "Subtotal" dialog box, select "Model" from the "At each change in" dropdown list.

Select the checkboxes for "Air Pollution Score", "City MPG", "Hwy MPG", and "Cmb MPG".

Select "Average" from the "Use function" dropdown list..

Click on the "OK" button.

To collapse the data to show just the total rows, you can click on the "2" button above the row numbers on the left-hand side of the worksheet.

To refresh the PivotTable data on the MPG PivotTable worksheet, you can follow these steps:

Click anywhere in the PivotTable.

Click on the "Analyze" tab in the ribbon.

Click on the "Refresh" button in the "Data" group.

To apply the Pivot Style Medium 1 Quick Style to the PivotTable and display a slicer for the SmartWay field and show only data where the SmartWay value is Elite, you can follow these steps:

Click anywhere in the PivotTable.

Click on the "Design" tab in the ribbon.

Click on the "PivotTable Styles" button in the "PivotTable Styles" group.

Select "Medium 1" from the list of Quick Styles.

Click on the "Insert Slicer" button in the "Filter" group.

Select "SmartWay" from the list of fields.

Select "Elite" from the list of values.

Click on the "OK" button.

Learn more about data on;

https://brainly.com/question/26711803

#SPJ1

The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Welcome to XYZ computing Enter username: jones Invalid username Enter username: b. Welcome to XYZ computing Enter username: smith Enter password: password Invalid access Enter username: c. Enter username: smith Enter password: password Invalid access Enter username: smith Enter password: FpQr56 Welcome to XYZ computing

Answers

Answer:

because the password being used is of high quality

Explanation:

Option C is the most preferable in terms of system security because the password being used is of high quality. Meaning that it contains lower case and capital case letters as well as numbers. It is also a random mix of all three and is not a common word or name. The length of the password is normal but could be longer for better safety. These things make it very difficult and time-consuming for a software program to guess the password, and nearly impossible for an individual to guess.

Please don't answer if you don't know Type the correct answer in the box
. Spell all words correctly. How does SQA differ from SQC? SQA involves activities to evaluate software processes, and SQC involves activities that ensure quality software.

Answers

Software Quality Assurance (SQA) and Software Quality Control (SQC) are two distinct aspects of quality management in software development, each with its own focus and activities.

How different are they?

SQA encompasses efforts directed toward assessing and enhancing the procedures of software development at every stage. The main emphasis is on guaranteeing that appropriate techniques, norms, and protocols are adhered to in order to create software of superior quality. SQA encompasses various tasks, including scrutinizing requirements, conducting process audits, and administering quality control procedures.

Conversely, SQC pertains to actions that prioritize assuring the quality of the actual software product. This involves employing methods such as testing, inspections, and reviews in order to detect flaws and guarantee that the software satisfies the stated demands and standards. The goal of SQC is to identify and rectify any shortcomings or irregularities within the software product.

To put it succinctly, SQA focuses on assessing and enhancing the manner in which software is developed, while SQC is primarily focused on verifying the excellence of the resulting software product. SQC and SQA both play a vital role in attaining an optimum level of software quality.

Read more about software here:

https://brainly.com/question/28224061

#SPJ1

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8

Which are potential harmful effects of intellectual property rights? Select 2 options.
safe communication between businesses may be stifled
no two companies can create the same products
malware is easily added onto well-known apps by hackers
trademarks and patents may be over-enforced by companies
general patents can prevent innovative ones from being filed

Which are potential harmful effects of intellectual property rights? Select 2 options.safe communication

Answers

Potential harmful effects of intellectual property rights include stifling safe communication between businesses and over-enforcement of trademarks and patents by companies. Option A, D.

Stifling safe communication between businesses: Intellectual property rights can sometimes hinder collaboration and communication between businesses. Strict enforcement of intellectual property laws may discourage companies from sharing valuable information or technologies with each other due to fear of potential legal repercussions.

This can impede innovation and slow down the development of new products or services.

Over-enforcement of trademarks and patents: Companies may sometimes over-enforce their trademarks and patents, leading to negative consequences. Overly aggressive protection of intellectual property can stifle competition and limit consumer choices.

It may prevent other companies from developing similar or improved products, hindering market dynamics and potentially reducing innovation. This can create monopolistic practices and hinder fair competition.

It is important to note that intellectual property rights are crucial for promoting innovation, incentivizing creativity, and protecting the rights of creators and inventors.

They provide an incentive for individuals and businesses to invest in research and development by offering exclusive rights and economic benefits. However, excessive protection and misuse of intellectual property rights can have unintended negative effects.

Other potential harmful effects not mentioned in the options include the creation of patent thickets, where a large number of overlapping patents make it difficult for new innovations to emerge.

Additionally, intellectual property rights can contribute to increasing inequality by limiting access to essential goods, such as life-saving medications, in certain regions due to high costs or patent restrictions.

Balancing the protection of intellectual property with the need for innovation, fair competition, and access to knowledge is a complex task.

Striking the right balance requires thoughtful consideration of the societal impact and the promotion of policies that encourage both innovation and the sharing of knowledge. So Option A,D is correct.

For more question on communication visit:

https://brainly.com/question/28153246

#SPJ8

How does blockchain work?

Answers

Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.

Answer:

I hope this website helps https://www.investopedia.com/terms/b/blockchain.asp

Explanation:

PowerPoint is a visual aid for many speakers. Discuss some points to remember when adding text to a PowerPoint presentation. How do they help make the experience better for the audience and the presenter? What things can you do when creating a PowerPoint presentation to assure that your work adds to the speaker’s presentation without detracting attention from the speaker?

Answers

Answer:

Use a lot of spinning animations to draw attention. Use many colors. A lot of text so you can read from the slide in case you get lost.

which of the following component display the content of active cells​

Answers

Answer:

The content of an active cell is shown in the formula bar

Explanation:

I hope it will help you

Which best describes the purpose of LoJack on a computer

Answers

Answer:The purpose of the lo jack on a computer  to the lock and delete files on the computer devices.

Explanation:The lo jack on a computer to locate all the lock and delete files.

lo jack can provides the computer on the passwords that contains different levels of the bios access.

lo jack perform on the computer operating system provides on the boot only the trusted by the computer operating system.

Lo jack computer on the function is used to the published  the exam answers on the websites.

Lo jack insures to the data into hard drives to the correct computer password.

Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.

Answers

Answer:

Here's an example of a program that does what you've described:

# Get the number of elements in the array

n = int(input("Enter the number of elements to store in the array: "))

# Initialize the array

arr = []

# Get the elements of the array from the user

print("Enter the elements of the array:")

for i in range(n):

   arr.append(int(input()))

# Print out which numbers are divisible by 5

print("The following numbers are divisible by 5:")

for i, x in enumerate(arr):

   if x % 5 == 0:

       print(f"{i}: {x}")

This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.

Explanation:

The Scientific Method is a/an

Answers

Answer:

It's a method used in science to ask questions, research, observe, hypothesize, experiment, analyze data, and make conclusions.

Explanation:

a method of procedure that has characterized natural science since the 17th century.

What information will you find in the 16-bit field in an IP datagram?

Answers

Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.

Explanation: Hopefully this helps you with what ever u are doing.

An information which you will find in the 16-bit field in an IP datagram is: the total length of the datagram it's attached to.

An IP address is an abbreviation of internet protocol address and it can be defined as a unique number assigned to a computer or other network devices such as routers, switches, etc., in order to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network device connected to the internet or an interconnected network.

In Computer networking, IP address are classified into two (2) main categories and these are;

Local (internal) IP address.Global (external) IP address.

An IP datagram can be defined as the standard format of data that an internet protocol (IP) recognizes.

Generally, an IP datagram comprises two (2) main components and these include:

1. The header: it is used for sending messages on a computer to the protocol in the same layer of a destination (recipient) computer.

2. The data: this is a set of information that is transmitted from one computer to another over an interconnected network.

On a related note, an IP datagram contain three (3) fields which are typically used for the transmission of data;

Header length.IP version.Total length.

The Total length is a field that is used to specify the total length of an IP datagram and it is typically 16-bits in size.

In conclusion, an information which is found in the 16-bit field in an IP datagram is the total length of the datagram it's attached to.

Find more information here: https://brainly.com/question/19204809

What information will you find in the 16-bit field in an IP datagram?

Help picture for 25 points

 Help picture for 25 points

Answers

Divide one number by the other, then multiply the result by 100 to get the percentage of the two numbers.

Explain about the Percentage?

Holding down Shift while pressing the 5 key at the top of the keyboard will produce a percent symbol on a U.S. keyboard. You can also construct a percent by using the Alt code Alt +37.

To open the Format Cells dialogue box, click the icon next to Number in the Number group on the Home tab. Click Percentage in the Category list of the Format Cells dialogue box. Enter the number of decimal places you want to display in the Decimal places box.

The percent sign is found on the numeral 5 key, which is placed above the R and T on a US keyboard layout. Press the 5 key while holding down the Shift key to insert%.

To learn more about Percentage refer to:

https://brainly.com/question/24877689

#SPJ1

Write a program that:

a. asks user to input the temperature in Fahrenheit.
b. It converts the inputted temperature into Celsius.
c. Calculates the speed of sound in meters per second and in feet per second. The program should display user's inputs and print the results in both m/s and ft/s

Answers

Answer:

sucks to suck

Explanation:

Drag each tile to the correct box.
Match the job title to its primary function.
computer system engineer
online help desk technician
document management specialist
design and implement systems for data storage
data scientist
analyze unstructured, complex information to find patterns
implement solutions for high-level technology issues
provide remote support to users

Answers

The correct match for each job title to its primary function:

Computer System Engineer: Design and implement systems for data storage.

Online Help Desk Technician: Provide remote support to users.

Document Management Specialist: Implement solutions for high-level technology issues.

Data Scientist: Analyze unstructured, complex information to find patterns.

Who is a System Engineer?

The key responsibility of a computer system engineer is to develop and execute data storage systems. Their main concentration is on developing dependable and effective storage options that fulfill the company's requirements.

The primary duty of an online help desk specialist is to offer remote assistance to users, addressing their technical concerns and resolving troubleshooting queries.

The main responsibility of a specialist in document management is to introduce effective measures to address intricate technological matters pertaining to document security, organization, and retrieval.

Read more about data scientists here:

https://brainly.com/question/13104055

#SPJ1

Test if a password entered is correct. The secret phrase is Ada Lovelace.

Sample Run 1
Enter the Password: Ada Lovelace
Sample Output 1
Correct!
Sample Run 2
Enter the Password: Blaise Pascal
Sample Output 2
Not Correct

for Python

Answers

password = "Ada Lovelace"

if input("Enter the Password: ") == password:

   print("Correct!")

else:

   print("Not Correct")

I wrote my code in python 3.8. I hope this helps.

Upload your completed Lesson 8 Simulation here. 8.Organizing Content in Tables

Answers

Tables are an effective way to organize and present information in a structured and easy-to-read format.

How to explain the table

Here are some tips on how to effectively organize content in tables:

Determine the purpose of the table: Before creating a table, identify the purpose and the message you want to convey. Determine what kind of information you want to include in the table and how it can be best presented.

Use clear and concise headings: Use headings that are brief and clearly describe the content in each column or row. Headings help the reader to quickly identify the content and understand the structure of the table.

Keep the table simple and easy to read: Avoid using too many colors, borders, and font styles. Keep the table clean and simple, with clear lines and easy-to-read fonts.

Use consistent formatting: Ensure that the table formatting is consistent throughout the document. Use the same font size, style, and color for all the tables.

Group similar items together: Organize the table by grouping similar items together. This makes it easier for the reader to compare and analyze the information.

Use appropriate units of measure: Use appropriate units of measure for the data presented in the table. For example, use dollars for financial data, and use percentages for statistical data.

Use appropriate table type: Choose the appropriate table type to present the data. There are various types of tables such as comparison tables, frequency tables, and contingency tables, among others. Choose the type that best suits your data.

Consider accessibility: Ensure that the table is accessible to everyone, including those with visual impairments. Use alt text to describe the content of the table, and ensure that the table is navigable with a screen reader.

By following these tips, you can create effective and easy-to-read tables that convey the message you want to share with your readers.

Learn more about tables on;

https://brainly.com/question/28768000

#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioned

item includes an ID number, item description, length of auction in days, and minimum required bid.

Design a flowchart or pseudocode for the following:

-a. A program that accepts data for one auctioned item. Display data for an auction only if the

minimum required bid is more than $250.00

Answers

The pseudocode for the program: Announce factors for the unloaded thing information, counting:

auction_id (numbers)

item_description (string)

auction_length (numbers)

minimum_bid (drift)

Incite the client to enter the auction_id, item_description, auction_length, and minimum_bid.

What is the pseudocode?

The program acknowledges information for one sold thing, counting the auction_id, item_description, auction_length, and minimum_bid. It at that point checks in case the minimum_bid for the unloaded thing is more prominent than or rise to to $250.00.

The pseudocode for the program pronounces factors for the sold thing information and prompts the client to enter the information. At that point it employments an in the event that articulation to check in case the minimum_bid is more noteworthy than or break even with to 250.00.

Learn more about pseudocode  from

https://brainly.com/question/24953880

#SPJ1

1.ShoppingBay is an online auction service that requires several reports. Data for each auctioneditem

Please help me out i have no time.

Please help me out i have no time.

Answers

Story, Sergei Rachmaninoff, one of the greatest pianists ever, was a key player in Russian music during the late Romantic period.

What was Sergei Rachmaninoff famous for?

Two of his works—the Prelude in C-sharp Minor, which was performed in front of an audience for the first time on September 26, 1892, and his Piano Concerto No. 2 in C Minor, which made its debut in Moscow on October 27, 1901—launched both his renown and popularity as a composer and concert pianist.

Sergei Rachmaninoff, one of the greatest pianists ever, was a key player in Russian music during the late Romantic period. He performed his own compositions while touring extensively and astounded audiences with his dexterity and touch.

Many people agree that Rachmaninoff is the best pianist of all time. Rachmaninoff identified as a romantic and yearned passionately for the romanticism of the 19th century to endure into the 20th.

To learn more about Sergei Rachmaninoff refer to:

https://brainly.com/question/28417886

#SPJ1

Match the features of integrated development environments (IDEs) and website builders to the appropriate location on the chart.

Match the features of integrated development environments (IDEs) and website builders to the appropriate

Answers

Answer:

website builder

complex coding techniques and advanced programming languages.

How can I write a program in c language that calculates and produces these 2 columns sequence numbers using looping statement?
Enter a number: 5
Sequence: 1, 2, 3, 4, 5
Squared: 1, 4, 9, 16, 25

Do you want to continue? Y/N

N

Answers

Answer:

#include <stdio.h>

int main(void) {

   // Declare variables to store the number and the loop counter

   int num, i;

   char cont;

   do {

       // Prompt the user to enter a number

       printf("Enter a number: ");

       scanf("%d", &num);

       // Print the sequence of numbers from 1 to the user-specified number

       printf("Sequence: ");

       for (i = 1; i <= num; i++) {

           printf("%d, ", i);

       }

       printf("\n");

       // Print the squares of the numbers from 1 to the user-specified number

       printf("Squared: ");

       for (i = 1; i <= num; i++) {

           printf("%d, ", i * i);

       }

       printf("\n");

       // Ask the user if they want to continue

       printf("Do you want to continue? Y/N: ");

       scanf(" %c", &cont);

   } while (cont == 'Y' || cont == 'y');

   return 0;

}

use the simple query wizard to create a select query combining fields from two related tables

Answers

Creating and using queries in Access can occasionally be as simple as choosing fields from a table, possibly adding some criteria, and then viewing the results. You can build a query that combines information from several sources.

In some cases, a query built on one dataset may provide you with the information you need, but adding data from another table may make the query results even more helpful and clear. Follow the given below steps to create a select query:

   • On the Create tab, click Query Wizard under the Queries group.

   • In the New Query dialogue box, select the Simple Query wizard and then click OK.

   • Select the table in the Tables/Queries combination box that contains the data you want to include in your query.

   • To add the first field to the query, click it, then use the single right arrow to add it to the list of Selected Fields.

   • To improve the results of your query, select the table in the Tables/Queries combo box that has relevant data.

   • Select the field you want to use to improve the results of your search from the list of Selected Fields, then click Next.

   • To see the results, select Detail and then Finish.

To learn more about Query click here:

brainly.com/question/14363871

#SPJ4

What are the different types database of end users? Discuss the main activi-ties of each

Answers

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

Answer:

1. Casual End Users

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

2. Naive or parametric end users

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

3. Sophisticated end users

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

4. Standalone users

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

Before hard disk drives were available, computer information was stored on:

Floppy Disks

Cassette Tapes

Punch Cards

All of the Above

Answers

floppy disks . is the answer
Other Questions
IfC(x) = 13000 + 400x 3.6x2 + 0.004x3is the cost function andp(x) = 1600 9xis the demand function, find the production level that will maximize profit. (Hint: If the profit is maximized, then the marginal revenue equals the marginal cost.)unitsQ 2Find f.f '''(x) = cos(x), f(0) = 4, f '(0) = 1, f ''(0) = 9f(x) =Q 3A particle is moving with the given data. Find the position of the particle. a(t) = 2t + 3, s(0) = 9, v(0) = 4 s(t) =Q 4Find the most general antiderivative of the function. (Check your answer by differentiation. Use C for the constant of the antiderivative.)f(x) = 6x5 7x4 6x2F(x) =Q 5Factor the polynomial and use the factored form to find the zeros. (Enter your answers as a comma-separated list. Enter all answers including repetitions.)P(x) = x3 + 3x2 9x 27x = What is the balance after 3years on a CD with an initialinvestment of $2,200.00 and a2.95% interest rate?A. $2,205.90C. $6,490.00B. $2,329.80D. $2,400.50 the cigarette industry is a good example of the oligopoly market structure. group of answer choices false true im stuck and i want to know the ans:/// isvalidmod10number function: this objective of this function is to take a 16 digit credit card number as a string parameter and create an integer array of each digit of extracted from the credit card number. then, starting from the last digit of the number array, multiply alternate number by 2 based on a check bit. if the multiplied number is greater than 9, subtract 9 from it and re-set the digit. if the multiplied number is less than or equal to 9, new digit will be the multiplied value. finally, add the digit to a final sum. return value of the function is the totalsum mod 10. identity if this sentence is simple complex compound or compound-complex (He complains about his grades,yet he does not spend much time studying Air quality monitoring a. is an important step toward making the air safe for all earth's organisms. b. is unnecessary when the air is free of pollutants from human activities. c. is not believed to be helpful in maintaining the health of human populations. d. does not produce data that are reliable enough to justify air quality controls. please answer a couple of questions for a survey I have to do for school ( you can lie on the ones you don't feel comfortable answering.)1. What is your height?2. How many siblings do you have?3. How many times per month do you go to the movies?4. What is your age?5. How many hours of sleep do you get each night on average?6. What is your favorite sport?7. What is your favorite video game?8. What is the main thing you do during the day? greg prepares a financial statement for his business, listing the company's current assets, fixed assets, and the debts that are owed to suppliers and lenders. what document is greg preparing for his business? Why must the government consider companies' needs as well as those of workers? Workers often take advantage of safety and wage laws and regulations. Company owners can easily vote government officials out of office. Employers deserve the same benefits and protections as employees do. Regulations can be costly and may drive companies out of business. Can u solve i will give Brainiest plz need it urgently Research into juveniles and the justice system has found that juveniles are more likely than adults to y-9y=x+7 Is y = x + 6x - 5 a solution to the differential equation shown above? Select the correct answer below: Yes O No which type of chart is preferred for when quartiles, median, and outliers are required for analysis and insights? an adult white client visits the clinic for the first time. during assessment of the clients skin, the nurse should assess for central cyanosis by observing the clients Daniel found 3 small whiteboards and 6 boxes of markers for coaches to use . Mr.Adams said they need a total of 8 white boards and 10 boxes of narkers How many more whiteboards and boxes of markers were needed Whats something that you used to like or do that you now find slightly embarrassing? Why do you think your feelings have changed? (Don't forget to write in complete sentences, use punctuation, and apply capitalization rules correctly.) Primary succession ________. a. is caused solely by human events b. occurs on preexisting soil c. occurs in areas without soil d. becomes normalized by climax species Please select the best answer from the choices provided A B C D Select the correct answer.Simplify the expression.[tex]\sqrt[5]{224x^{11}y^{8} }[/tex]A.[tex]2xy^3} \sqrt[5]{7x^{3}y^{2} }[/tex]B.[tex]2x^{2}y \sqrt[5]{7xy^{3} }[/tex]C.[tex]2xy \sqrt[5]{5xy^{3} }[/tex]D.[tex]2x^{2} y^{2} \sqrt[5]{5x^{7}y^{5} }[/tex] What map would this be categorized as A.physical B.Political C.Historical D.Distribution