answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
2 years ago
9

describe briefly one scenario where records stored in a computer frequently need to be searched. state why the searches may be c

arried out
Computers and Technology
2 answers:
Nadya [2.5K]2 years ago
8 0

Answer

The scenarios are when;

• The spring input is invalid

• The source is not attached to the search engine in use

Explanation

A collection of saved data, organized for easy retrieval is called a database. Each data item is stored in a position relative to the others. A proper retrieval requires searching sequentially through the whole file record using a proper search word.


Gnoma [55]2 years ago
4 0
Because the string is invalid or your source is not attached to your search engine.
You might be interested in
A school principal trying to find out if parents will help buy new playground equipment shows digital leadership by.
ELEN [110]

Answer:

D. is the correct answer!

8 0
2 years ago
Read 2 more answers
Complete this truth Table. Write a program that you can enter from the keyboard, a 1 or 0 into three Boolean variables, A,B,C. W
SSSSS [86.1K]

Answer:

Following are the code to this question:

#include<stdio.h>//defining header file

int AND(int x,int y) //defining a method AND that hold two variable in its parameter

{

if(x==1 && y==1)//defining if block to check x and y value is equal to 1

{

return 1;//return value 1

}

else //defining else block

{

   return 0;//return value 0

}

}

int OR(int x,int y)//defining method OR that hold two variable in its parameter

{

if(x==0&&y==0)//defining if block to check x and y value is equal to 1

{

return 0;//return value 0

}

else //defining else block

{

   return 1;//return value 1

}

}

int main()//defining main method

{

int a,b,c;//defining integer variable  

int k=1;//defining integer variable k that holds a value 1

while(k<=8)//defining while loop for 8 time input

{

printf("Please insert 3 numbers in (0 0r 1):\n ");//print message

scanf("%d%d%d", &a, &b, &c);//input value

k++;//increment the value of k by 1

printf("value: %d\n",AND(OR(a,b),c));

}

return 0;

}

Output:

please find the attachment.

Explanation:

In the above-given C language code two methods "AND and OR" is declared, holds two integer variable "x and y" in its parameters, inside the method a conditional it used that can be defined as follows:

  • In the AND method, inside a conditional statement, if block check x and y both value is same that is 1 it will return 1 or it will goto else block in this it will return value 0.      
  • In the OR method, inside a conditional statement, if block check x and y both value is the same, that is 0 it will return 0 or it will goto else block in this it will return value 1.
  • In the main method, four integers "a,b,c, and k" is declared in which variable "a, b, c" is used in the loop for 8 times input values from the user and print method is used to call the method and prints its return values.

8 0
2 years ago
4.9 Code Practice: Question 3
Zanzabum

total = 0

for x in range(99, 0, -1):

   total += x

   print(total)

I hope this helps!

6 0
2 years ago
Read 2 more answers
_____ is the physical link between a network and a workstation. a. The session layer b. An html address c. An adapter card d. A
AveGali [126]

Answer:

(d) Network topology

Explanation:

The physical or logical layout of all connecting devices including their connecting materials (such as cables) of a network is called the topology of the network. It is also the systematic and schematic arrangement of the devices (such as printers, scanners, computers, routers, bridges) that make up a network and their communication media. Examples of these communication media are twisted pair cable, optical fiber cable e.t.c

Types of topology (especially in a LAN - Local Network Area) are;

i. bus topology

ii. ring topology

iii. mesh topology

iv. star topology

4 0
2 years ago
Read 2 more answers
Implement a function printWordsLines() that takes as a parameter the name of an input file. It opens the input file and then pri
Talja [164]

Answer:

def printWordsLines(filename):

   file = open(filename, 'r')

   lines = 0

   words = 0

   for line in file:

       line.rstrip()

       lines += 1

       word = line.split(' ')

       words += len(word)

   print('the file ',filename,' contains ',words,' and ', lines, ' lines')

   file.close()

printWordsLines('words')

Explanation:

the file used was words in txt format and its contents are given as follows

hello aamir jan khan

parallelogram abdullah

anaconda ali

pycharm notebook

7 0
2 years ago
Other questions:
  • Which of the following is a benefit, as well as a risk, associated with client/server networks?
    14·1 answer
  • Match each logical function with its description. AND COUNTIF SUMIF IF tests for a certain condition and returns one of two valu
    7·1 answer
  • Survey Q. Non-scoring: If you are working in a customer facing agile team, who is more mature/ready for Agile? (1 correct answer
    12·2 answers
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
    14·2 answers
  • If you're found to be at fault in _____, your driver license will be canceled within 90 days unless you complete a 12-hour Advan
    10·2 answers
  • Assume that a kernel is launched with 1000 thread blocks each of which has 512 threads. If a variable is declared as a shared me
    6·1 answer
  • A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
    9·1 answer
  • Referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relation
    5·1 answer
  • Given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a Vend
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!