answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
2 years ago
9

describe briefly one scenario where records stored in a computer frequently need to be searched. state why the searches may be c

arried out
Computers and Technology
2 answers:
Nadya [2.5K]2 years ago
8 0

Answer

The scenarios are when;

• The spring input is invalid

• The source is not attached to the search engine in use

Explanation

A collection of saved data, organized for easy retrieval is called a database. Each data item is stored in a position relative to the others. A proper retrieval requires searching sequentially through the whole file record using a proper search word.


Gnoma [55]2 years ago
4 0
Because the string is invalid or your source is not attached to your search engine.
You might be interested in
Write a sequence of statements that create a file named "greeting" and write a single line consisting of "Hello, World!" to that
tia_tia [17]

Answer:

The solution code is written in Python 3 as below:

  1. outfile = open("greeting.txt", "w")
  2. outfile.write("Hello World")
  3. outfile.close()

Explanation:

To create a simple text file in Python, we can use Python built-in function, <em>open()</em>. There are two parameters needed for the open() function,

  1. the file name and
  2. a single keyword "w". "w" denote "write". This keyword will tell our program to create a file if the file doesn't exist.

The statement <em>open("greeting.txt", "w")</em> will create a text file named "<em>greeting.txt</em>" (Line 1)

To fill up the content in the greeting.txt, we use <em>write()</em> method. Just include the content string as the argument of the <em>write()</em> method. (Line 2)

At last, we use <em>close() </em>method to close the opened file,<em> outfile</em>. This will release the system resource from the<em> outfile.</em>

4 0
2 years ago
Constantine forms the following hypothesis. Let n be any non-negative number that meets the following condition: when n is divid
notka56 [123]

Answer:

n=5

Explanation:

if n= 5

i.     n/5=5/5=1  so it divides completely the remainder is 0

ii.  97 - 6(5) = 97 - 30 = 67,   67 is a prime number.

8 0
2 years ago
The act of engaging in crime through the use of a computer or similar type of device is called:
marin [14]
I don’t have an explanation for why it is called this, because really the name of it is in its definition. The two words this sentence describes are cybercrime and computer crime. They are both the same thing.
8 0
2 years ago
A Color class has three int color component instance variables: red, green, and blue. Write a toString method for this class. It
ELEN [110]

Answer:

public String toString() {

return "#(" + red + "," + green + "," + blue + ")";

}

Explanation:

The code:

public String toString() {

return "#(" + red + "," + green + "," + blue + ")";

}

Is a tostring java code, and it is so easy to write one, as compare to other programming languages

Writing a tostring method returns a strinb representation of an object in Java. Normally, the toString method returns the name of the object’s class plus its hash code.

This code creates a new colour object; then the result of its toString method is printed to the console.

Tostring method can be override. The default implementation of toString isn’t very useful in most situations. So, one can just override it.

8 0
2 years ago
Select the correct answer. Marie uses a browser to visit a blog. How is the blog uniquely identified? A. web page B. website C.
damaskus [11]

Answer:

I belive the answer is E

Explanation:

8 0
1 year ago
Other questions:
  • bill and melinda have two young children ages 2 and 4 and they are not covered under any life insurance policy. Melinda is full
    8·1 answer
  • Suggest two other subtasks that may be performed in a dice game?
    15·2 answers
  • Replace the underlines with the words in parentheses that follow: the ____ solves the ____ of a ____ by expressing an ____ in a
    8·1 answer
  • In which of these places might you be most likely to find a peer-to-peer network? On the Internet In a hospital In a home In a l
    5·2 answers
  • An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
    5·1 answer
  • The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
    7·1 answer
  • As you are planning your informative speech on the prevalence of Internet memes in pop culture and you wonder if your audience w
    14·1 answer
  • Which would be the most efficient way to store files on your computer?
    13·2 answers
  • Your project must satisfy the following requirements:
    7·1 answer
  • Create a single list that contains the following collection of data in the order provided:
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!