select the correct answer
What is SQL used for?
A. to write machine language code
B. to design webpages
C. to extract information from databases
D. to convert machine language into a high-level language

Answers

Answer 1

The SQL used to extract information from databases. (Choice: C)

Functions of SQL language

In this question we must understand about computer languages to answer correctly.

SQL stands for Structured Query Language and is a specific domain language intended for the management and retrieve of relational databases. Thus, SQL is used to extract information from databases.

Thus, SQL is used to extract information from databases. (Choice: C) [tex]\blacksquare[/tex]

To learn more on databases, we kindly invite to check this verified question: https://brainly.com/question/6447559

Answer 2

Answer:

The correct answer is C. To extract information from databases.

Explanation:

I got it right on Edmentum.


Related Questions

(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer:

a trade mark is something where someone owns the rights to something in a specific country

If you ship bakudeku. I swear.
*RANTS*

Answers

cries in bakudeku shipper

Ryan is applying a sort to the data in a table that you have inserted in Word. Which option is important for most tables that have column headings?
• Sort in descending order.
• Sort in ascending order.
• Select the option "My List has Header Row."
• Choose the correct sort field.

Answers

Ryan is applying a sort to the data in a table that you have inserted in Word.By Choose the correct sort field option is important for most tables that have column headings.

What is statistics?

A statistics desk is a number cell wherein you may alternate values in a number of the cells and give you one-of-a-kind solutions to a problem. An appropriate instance of a statistics desk employs the PMT feature with one-of-a-kind mortgage quantities and hobby fees to calculate the low-priced quantity on a domestic loan you can set up in descending, or you may set up in ascending.

And D, has not have anything to do with this requirement. You do not have this feature to be had with you. Select the option, "My listing has header row" isn't always to be had to us. And clearly, you want to pick out the excellent type of discipline first. And then you may set up or type accordingly.

Read more about the column headings:

https://brainly.com/question/1788884

#SPJ2

Which file organisation has the quickest access to data files? *

1 point

a)Direct

b)Serial

c)Sequential

d)Transaction​

Answers

A direct have the quickest access to data files

Complete the sentence.
A beta version of software is released during the _______ phase of software development.

Teseting

Release

Coding

Design

Answers

Hi Bro... , You Have A Wonderful Questions.

IF WE DIRECTLY JUMP RIGHT ON THE ANSWER , THEN THE SENTENCE WILL BE :

A Beta Version Of Software Is Released During The "Testing" Phase Of Software Development.

Explaination :

A Version Of A Piece Of Software That Is Made Available For Testing, Typically By A Limited Number Of Users Outside The Company That Is Developing It, Before Its General Release Is Called Beta Version.

As Mentioned Here , We Can See That Beta Version Is Made For Testing Purpose, To Test Whether It Working Properly Or Not.

Hope This Answer Satisfied You ^_^

And Thanks For The Points ;-)

A beta version of software is released during the Testing phase of software development.

What does having a beta version mean?

A pre-release of software that is given out to a large group of users to try under real conditions. Beta versions have gone through alpha testing in-house and are generally fairly close in look, feel and function to the final product; however, design changes often occur as a result.

What is alpha and beta version?

A beta test is carried out following acceptance testing at the supplier's site (alpha test) and immediately before the general release of the software as a product. In general an alpha version or release of a software package intends to do something particular, mostly does so, yet isn't guaranteed to do so fully.

To learn more about A beta version, refer

https://brainly.com/question/23441836

#SPJ2

Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.

Release

Planning

Design

Coding

Answers

You might create algorithms and flowcharts during the Design phase of software development.

What is the algorithms  about?

In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.

Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.

Learn more about algorithms from

https://brainly.com/question/20543449

#SPJ1

Need the answer ASAP!! No links I’ll report

Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?

A.software engineering process

B.software quality metrics

C.SQA audits

D.reviews

Answers

Answer:

C

Explanation:

I NEED THIS NOW!! :((

Which feature of a database allows a user to locate a specific record using keywords?

Chart
Filter
Search
Sort

Answers

which feature of a database allows a user to locate a specific record using keywords?

search

what are the outputs of these please help

Answers

Answer:

monkey know monkey not tell

Explanation:

Answer:

it will ask for a number.

if that number < or = to 0

then

it will add three to that number.

if that is not true

and that number > 0 and that number < 5

than

it will add one to that number.

if none of those are true

than

it will subtract 5 to that number.

Explanation:

I’ll mark brainliest if correct

Select the correct answer.
Andy, a developer, is designing a new program. Which tool should Andy use to help him complete his task?

A. SQL-Integrity Check

B.Unified Modeling Language

C.Selenium

D.Perforce

Answers

Answer:

I believe the answer is B

Explanation:

Which of the following is something that would NOT appear in the Reviewing pane?
a. The date on which a specific insertion was made.
b. The length of the document being reviewed.
c. The name of the person making an insertion.
d. The total number of revisions made to the document.

Answers

Answer:

A

Explanation:

.....is used to save project in Visual basic .net from file menu

Answers

Explanation:

I don't really understand what you're trying to get at, maybe try to abbreviate a little more?

What is the purpose of using a tripod when filming?

Answers

Answer:

It helps with the camera  movement to get different angles and directions. Sometimes to keep it safe from falling out of grasp.

Explanation:

Answer:

it steadys the camera and can hold it in place for accurate shots.

Explanation:

Define the term, external hard drive. Explain why you would use an external hard drive instead of a second internal hard drive.

Answers

Answer:

An external hard drive is a storage device located outside of a computer that is connected through a USB cable or wireless connection. An external hard drive is usually used to store media that a user needs to be portable, for backups, and when the internal drive of the computer is already at its full memory capacity.

Explanation:

External hard drives are usually portable thats why  it is commonly used!

Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to ping multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts

Answers

Answer:

1. Nmap.

2. Fping.

3. Hping.

4. Nessus.

5. Closed port.

6. OpenVAS.

7. Filtered port.

8. Open port.

9. Port scanning.

10. Ping sweep.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.

In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.

1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.

2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.

3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.

4. Nessus: the original utility from which OpenVas was developed.

5. Closed port: a port state which does not allow entry or access to a service.

6. OpenVAS: an open-source fork of Nessus.

7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.

8. Open port: a port state that allows access to applications and can be vulnerable.

9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.

10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.

When creating a storyboard, in which section do you mention how you move from one shot to the next?
A.
synopsis
B.
sketch
C.
transitions
D.
shot description
E.
shot sequence number

Answers

Answer: C

Explanation:

Answer:

E. shot sequence number

Explanation:

10 points each!!!
Which option can be inferred from the following scenario?

You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work.


The temperature on the thermostat should be set lower than 78°F.

The air conditioner is not functioning properly.

The air conditioner was turned off.

The thermostat is faulty and may need calibration.

Answers

Answer:

Option D

Explanation:

78 degree Fahrenheit is a below normal temperature during summer. Now if the room temperature is set a 78 degree Fahrenheit, then one must not feel that the room is warmer than usual.

Hence, there can be some issue with the thermostat. Hence, thermostat needs calibration as it is not working properly.

Option D.

Answer:

d

Explanation:

You come home from work on a summer afternoon and notice your home is warmer than usual. You check the thermostat. The room temperature is set at 78°F, so the house should seem cooler. You lower the temperature on the thermostat several degrees in order for the air conditioner to work so you should calibrate it



…..is the smallest size in audio files

Answers

Answer:

Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.

Explanation:

Answer:

Wav files can be 16 bit,8 kHz (i.e 128 k bits per second) while mp3 could be compressed to 16 kbits per second. Typically wav is x10 larger than mpg. This is ratio is highly content specific. Wav is a raw format, while mp3 is a compressed format for audio.

Opportunity and Spirit, NASA's Mars Exploration Rovers, were the first scientific instruments able to collect samples directly from the surface of Mars. One of the mission's goals was to determine the likelihood that life ever existed on Mars. How were Spirit and Opportunity best able to supply evidence that in the distant past Mars may have had an environment favorable to life?

Answers

Answer:

The rovers sent images of cross beds, centimeter-scale areas in rock layers, that could indicate whether water once flowed on Mars.

Explanation:

Create a mobile app plan using PowerPoint slides to show mock-ups of screens, identifying input, process, and output for each
screen,

Answers

Answer:

PowerPoint slides to show mock ups

A chain of coffee servers is sending a spreadsheet of projected costs and profits to some of its investors. When, Kyle, the administrator making the spreadsheet, adds an image of his company’s logo, he realizes it would fit and look best if turned to read sideways.

How can Kyle change the image to make it fit in such a way?

He can select the image and hold down on the green handle above it while sliding the mouse.
He can select the image and hold down Control while sliding the scroll bar to the right.
He can press the PivotTable button and select “Rotate 90 degrees” and then click OK.
He can click on the Pictures Tool tab and select press Artistic Effects to access the rotate option

Answers

Answer:

On a spreadsheet application including MS Excel;

He can select the image and hold down the rotation handle above it while sliding the mouse

Explanation:

Manual rotation of a picture or a text box can be performed by selecting the image or text box in MS Word or a spreadsheet application such as MS Excel. With the mouse select the rotation handle of the picture and drag in the direction desired, left or right.

So as to limit the rotation to 15 degrees hold down the shift button while dragging the rotation handle by clicking on it with a mouse and dragging in the desired direction

Which audio media can be directly sent to the subscribers through an RSS feed?
A.
online streaming
B.
podcast
C.
cloud file
D.
live playback
E.
broadcast

Answers

I believe it’s c sorry if I’m incorrect though

Answer:

The correct answer should be B. podcast

Explanation:

there is a website called RSS feed that is podcasts

What type of address uses a number that uniquely identifies each computer?
O Computer address
O Home address
O E-mail address
O IP address​

Answers

Answer:

The awnser is D or IP Address

Explanation:

BRAINLIEST PLEASE

Answer:

IP Address. This is the most unique as you can track computers down with this code too. I hope you found this helpful, you are very welcome!

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

What is a bounding box

Answers

Answer:

bounding or enclosing box for a point set in N dimensions is the box with the smallest measure within which all the points lie.

Which of the following statements is true regarding the technical issues for developing applications for global audiences? Select 3 options.

Content delivery networks prevent traffic surges and can offset slow local internet service.

You should base your choice of which operating system to develop on usage rates in that specific market

Most users now have stable, fast connections worldwide.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

Answers

Answer:

Explanation:

From the available options presented, when developing for a global audience the following are true...

Content delivery networks prevent traffic surges and can offset slow local internet service.

A content delivery network can provide quick access to your content, no matter where your users live.

You should consider limiting the number of large images or audio files that you include, depending on the target market.

For global applications content delivery networks are a must since they allow the end-user to access the web page and its high quality content as if the web server were close by. By reducing the distance between the server and the end-user through these networks, you are effectively reducing latency, load times, performance, traffic surge effects, etc. Also when developing for a worldwide audience you should limit the number of larger images and audio files to only show the necessary ones for each target region, in order to make performance much more stable.

Many applications ask, "Why did you leave your previous position?" Choose the best answer out of the examples below.

Answers

We can't see the examples therefore we can't help you try asking the question again with a picture of the examples

This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info

Answers

Answer:

contact their support

Explanation:

Janet is working on a highly confidential company budget spreadsheet, and she needs to prevent anyone, including administrators in the IT department, from being able to open the file and view its contents.
What should she do?

A) Use the Home tab, select Protect Sheet, and enter a password to prevent access to the sheet.
B) Click the Info tab in the Backstage view, select Protect Workbook, select Encrypt with Password, and enter a password.
C) Click the Review tab, select Protect Workbook, and enter a password for protecting the sheet.
D) Click the View tab and customize the view to protect the sheet from unauthorized users.

Answers

It has to be I took it

What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.

Answers

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

Hence, the end result will save the smallest in value

Other Questions
The author most likely chose this narrative point of view to . Answer choices for the above question A. suggest that Jos is the hero of the story and Arnie is the villain B. give readers a window into Joss thoughts at crucial moments in the story C. make readers more resentful of Joss cousin, Arnie D. express disapproval towards the character of Mr. Clemens Can someone help me on this Find the slope of the line that passes through ( 25,20 ) and ( 11,-20 ) Explain why most local water budgets are not balanced true or false 16.the capo means up to end PLEASE HELPPP AKA JASMINE IS THE BEST PURwill give brainliest Put the steps of the writing process in the correct order Who do Nepalese people celebrate birthday of culture Justin has a 2pound bag of Lima beans that he want to divide between 3families.how many pound of Lima beans should each family's receives? A. 3/2 pound b.2/3 c.2 1/3 pound d.3 1/3 pounds Name one way in which civilians played a role or were affected by World War II HELP PLEASEi cant tell wither its c or d cause im an idiot Shays's Rebellion occurred because _____________ . A) farmers did not want to sell their land to pay debts B) farmers were angry that there was no centrally-organized army C) the government tried to force farmers to give their land to Indians. Please help! I will give Brainliest!Who is correct? please help me i dont understand thank you!! write the equation of a circle with a center at (-1,2) and a radius of 7 The FBI wants to determine the effectiveness of their 1010 Most Wanted list. To do so, they need to find out the fraction of people who appear on the list that are actually caught. Step 1 of 2: Suppose a sample of 517517 suspected criminals is drawn. Of these people, 211211 were captured. Using the data, estimate the proportion of people who were caught after being on the 1010 Most Wanted list. Enter your answer as a fraction or a decimal number rounded to three decimal places. How many 1/7 cup servings are in 9 cups of pecans (in fraction form) Please help! Thank you so much! please use lots of details! What is the difference between specialization and cross-training?A. Specialization is for employees at the top management level ofthe company while cross-training is for employees at the entrylevel.B. Specialization is for employees who love what they do while cross-training is for employees who don't love any one particular area oftheir work.C. Specialization leads employees to focus on a single skill or taskwhile cross-training deals with training employees in multiple skillsor tasks.D. Specialization is for employees who have an advanced degreewhile cross-training is for those who do not have an advanced what did Kennedy promise in his campaign?