answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
2 years ago
15

________ is used to undo unwanted database changes.

Computers and Technology
2 answers:
trapecia [35]2 years ago
8 0
Backward Recovery
<span> ________ is used to undo unwanted database changes. </span>
riadik2000 [5.3K]2 years ago
5 0
Backward Recovery would be the answer.

(:
You might be interested in
A contact list is a place where you can store a specific contact with other associated information such as a phone number, email
Arte-miy333 [17]

Answer:

# The user in prompted for input and stored in userInput

userInput = str(input("Enter the contact: "))

# The user input is splitted and stored in splitUserInput

# splitUserInput is a list because split returns a list

splitUserInput = userInput.split(" ")

# The user is prompt to enter the search contact

# The search contact will have the first letter capitalize

# should it be entered in lower case all through

searchContact = str(input("Enter the search contact: "))

# loop through the list

for i in range(len(splitUserInput)):

   # compare if the string at any value of i

   # is the same as the searchContact

   # we display the string ahead of it

   # by adding 1 to the index

   if(splitUserInput[i] == searchContact):

       print(splitUserInput[i + 1])

Explanation:

A sample screenshot is attached. The code is written in Python 3 and well commented.

The program prompt the user for input then split the input into a list. It then asked for a contact to search for. It begins looping through the list, if the search contact is found at any index, then it prints what is in front of the index.

5 0
2 years ago
Write a statement that defines an ifstream object named inputFile and opens a file named "Friends.txt".
Simora [160]

Answer:

ifstream inputFile;

inputFile.open("Friends.txt");

Explanation:

Though, the programming language is not stated, questions like this are often from C++.

The first statement defines the ifstream object using the following syntax.

ifstream [object_name]

In this case, the object name is inputFile

So, the syntax becomes

ifstream inputFile;

The next line opens a file using the following syntax.

[object_name].open("Filename")

Here, object_name is inputFile and filename is Friends.txt

So, the open statement becomes

inputFile.open("Friends.txt")

5 0
2 years ago
Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolut
Angelina_Jolie [31]

Answer:

float x

float y

float z

x = Get next input

y = Get next input

z = Get next input

Put RaiseToPower(x, y) to output

Put "\n" to output

Put RaiseToPower(x, RaiseToPower(y, z)) to output

Put "\n" to output

Put AbsoluteValue(x) to output

Put "\n" to output

Put SquareRoot(RaiseToPower(x*y, z)) to output

Explanation:

The first three lines of code is simply declaring the data type of the x, y and z variables which was declared as float type meaning number with decimal points.

The next three lines after the first three lines is getting the input from the user

In coral, we use Put <expression> to output to display <expression> to the console

For the first Put statement, I am telling the interpreter to display the value of x raised to the power of y to the console by using Coral's RaiseToPower built-in math function

The Put "\n" to output statement scattered in the snippet is just for formatting reasons so that each result will be displayed in a newline

The next computation RaiseToPower(x, RaiseToPower(y, z)) is a bit nested but  it is actually doing this: x^{y^{z} }

The next computation is AbsoluteValue(x) is doing this |x|

And the final computation SquareRoot(RaiseToPower(x*y, z)) is doing this:

\sqrt{(xy)^{z} }

3 0
2 years ago
An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa
solong [7]

Answer:

firewalls and encryption

Explanation:

the company placed a firewall and an encryption code to the hard drive as a precaution against theft and malicious intent

3 0
2 years ago
Which of these graphic elements combine text, illustrations, and color? Word Art Smart Art Clip Art none of the above
irakobra [83]

Answer:

I believe it's Word Art

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • What might be one reason why a stock becomes more valuable over time
    5·1 answer
  • If you have long column labels with columns so wide that they affect the readability of a worksheet, you should first
    7·1 answer
  • In which of these places might you be most likely to find a peer-to-peer network? On the Internet In a hospital In a home In a l
    5·2 answers
  • Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
    14·1 answer
  • RFID tags are used in secure environments primarily due to the fact they are impossible to counterfeit.
    5·1 answer
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • Which of the following statements regarding critical paths is true? a. On a specific project, there can be multiple critical pat
    5·1 answer
  • In the Budget Details sheet, if you wish to autofill with the formula, you must use a ______ reference for the LY Spend Total ce
    10·1 answer
  • Write an if-else statement to describe an integer. Print "Positive even number" if isEven and is Positive are both true. Print "
    14·1 answer
  • Write an application that allows a user to enter the names and birthdates of up to 10 friends. Continue to prompt the user for n
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!