answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
2 years ago
9

describe briefly one scenario where records stored in a computer frequently need to be searched. state why the searches may be c

arried out
Computers and Technology
2 answers:
Nadya [2.5K]2 years ago
8 0

Answer

The scenarios are when;

• The spring input is invalid

• The source is not attached to the search engine in use

Explanation

A collection of saved data, organized for easy retrieval is called a database. Each data item is stored in a position relative to the others. A proper retrieval requires searching sequentially through the whole file record using a proper search word.


Gnoma [55]2 years ago
4 0
Because the string is invalid or your source is not attached to your search engine.
You might be interested in
How long does it take 2 consultants to create a slide deck of 120 slides, assuming one consultant make 2 slides per hour?
Andreyy89

It would take 2 consultants 30 hours to create a slide deck of 120 slides.

Explanation:

Rate of slide making by one consultant- 2 slides per hour

Target- 120 slides

2 consultants are employed in the job-  

Since 2 consultants are employed in the job, total rate of making slides per hour would be 4 slides/hour (2*2 slides/hour)

Time required to complete 120 slides= total slides/rate of doing slides per hour

Substituting the values, we get

Time required= 120/4= 30 hours

Hence, it would take 30 hours for 2 consultants to create a slide deck of 120 slides.

7 0
2 years ago
Gill is a computer forensics investigator who has been called upon to examine a seized computer. This computer, according to the
Keith_Richards [23]

Answer:

the answer is d. Hybrid attack.

8 0
2 years ago
Using the College Registration example from Section 6.7.3 as a starting point, do the following:
Margarita [4]

Answer:

Check the explanation

Explanation:

INCLUDE Irvine32.inc

TRUE = 1

FALSE = 0

.data

gradeAverage WORD ?

credits WORD ?

oKToRegister BYTE ?

str1 BYTE "Error: Credits must be between 1 and 30" , 0dh,0ah,0

main PROC

call CheckRegs

exit

main ENDP

CheckRegs PROC

push edx

mov OkToRegister,FALSE

; Check credits for valid range 1-30

cmp credits,1 ; credits < 1?

jb E1

cmp credits,30 ; credits > 30?

ja E1

jmp L1 ; credits are ok

; Display error message: credits out of range

E1:

mov edx,OFFSET str1

call WriteString

jmp L4

L1:

cmp gradeAverage,350 ; if gradeAverage > 350

jna L2

mov OkToRegister,TRUE ; OkToRegister = TRUE

jmp L4

L2:

cmp gradeAverage,250 ; elseif gradeAverage > 250

jna L3

cmp credits,16 ; && credits <= 16

jnbe L3

mov OkToRegister,TRUE ; OKToRegister = TRUE

jmp L4

L3:

cmp credits,12 ; elseif credits <= 12

ja L4

mov OkToRegister,TRUE ; OKToRegister = TRUE

L4:

pop edx ; endif

ret

CheckRegs ENDP

END main

4 0
2 years ago
Choose the attribute used to provide accessibility by configuring a text alternative that is available to browsers and other use
musickatia [10]

Answer:

alt

Explanation:

The alt attribute is an HTML attribute that is used in an HTML and XHTML documents to indicate alternative text (alt text) that is to be rendered whenever the element to which it is applied can no longer be rendered.

The alt attribute also provides alternative details for an image if a pc user for a number of reasons can’t view it (as a result of either slow connection, an error in the src attributes, or if there’s a screen reader being used by the user).

8 0
2 years ago
In the lab, you used the filter box in Wireshark to remove traffic from port 3389. What is that port used for? What filter synta
Dmitry_Shevchenko [17]

Answer:

Port 3389 is used for remote desktop access to graphical interfaces.

The syntax used to track ping traffic is " tcp.port eq 25 or icmp".

Explanation:

Wireshark is a network packet sniffer tool used to analysing and troubleshooting packet transmission in a network.

The ping command is used in a network to check or confirm connectivity between two devices in the network. It sends ICMP message echos to the specified IP address and receives it back if there is connection. To get the ping traffic in wireshark the command syntax " tcp.port eq 25 or icmp" is used.

The port 3389 is a TCP and UDP listening port for the Microsoft proprietary protocol called remote desktop protocol or connection used to remotely connect to the graphical interface of other system running the RDP server.

6 0
2 years ago
Other questions:
  • Ruby is creating a presentation. She wants each slide displayed at intervals of five seconds. Which feature in the presentation
    6·2 answers
  • Splunk uses ________ to categorize the type of data being indexed..
    11·2 answers
  • In __________ mode, the data within an ip packet is encrypted, but the header information is not.
    15·1 answer
  • When you connect to an unsecured wireless network, what might dishonest or unscrupulous computer users try to do?
    11·1 answer
  • Select which type of computer you would like to begin building, based on the needs of your new job: Frequent travel Maintaining
    7·1 answer
  • Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to beco
    15·1 answer
  • There is a function we are providing in for you in this problem called square. It takes one integer and returns the square of th
    9·1 answer
  • Using virtualization comes with many advantages, one of them being performance. Which of these is NOT another realistic advantag
    7·1 answer
  • Go to the Creamy Ice Corporation passage on the next page. Insert the trademark sign after the word “Corporation'' in the first
    9·1 answer
  • A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!