question 5 data analysts use archiving to separate current from past work. it also cuts down on clutter. 1 point true false

Answers

Answer 1

Data analysts utilize archiving to distinguish between recent and old work. True, it reduces clutter as well. The answer is (TRUE).

What are the responsibilities of data analysts, then?

(1) Building, maintaining, and fixing databases and data systems, including fixing coding problems and other data-related problems.

(2) rearranging the data to make it readable by both people and machines once information has been extracted from primary and secondary sources.

(3) using statistical methods, examining data sets for trends and patterns that may be useful for efforts at diagnostic and prescriptive analytics.

(4) underlining the significance of their work in the context of local, societal, and global changes that have an impact on their industry and business.

(5) generating executive leadership reports that communicate trends, patterns, and projections using relevant data.

To know more about Database, visit:

https://brainly.com/question/30051761

#SPJ1


Related Questions

Project stem 4.1 code practice
Python!!
Write a program that asks the user to enter a city name, and then prints Oh! CITY is a cool spot. Your program should repeat these steps until the user inputs Nope.


Sample Run

Please enter a city name: (Nope to end) San Antonio

Oh! San Antonio is a cool spot.

Please enter a city name: (Nope to end) Los Angeles

Oh! Los Angeles is a cool spot.

Please enter a city name: (Nope to end) Portland

Oh! Portland is a cool spot.

Please enter a city name: (Nope to end) Miami

Oh! Miami is a cool spot.

Please enter a city name: (Nope to end) Nope

Answers

A program that the user to enter a city name, and then prints Oh! CITY is a cool spot as follows:

City_name = input("Please enter a name or type Nope to terminate the program: ")

while( user_name != "Nope" ):

print("Oh! CITY is a cool spot" , City name)

City name = input("Please enter a name or type Nope to terminate the program: ")

What is a Computer Program?

A computer program may be defined as a series or set of instructions in a programming language that are utilized by the computer to execute successfully.

The variable "City_name" is used to store the input of the user. He might input his name or "NOPE" to terminate. Then we used a while loop to check if the user input NOPE. Then, we print Oh! CITY is a cool spot for "users input".

Therefore, a program that the user to enter a city name, and then prints Oh! CITY is a cool spot is well-described above.

To learn more about Computer programs, refer to the link:

brainly.com/question/1538272

#SPJ1

unsecure protocols are classified as which type of vulnerability? patching vulnerability configuration vulnerability platform vulnerability third-party vulnerability

Answers

A zero-day vulnerability may be exploited before a developer can make a patch for it, in contrast to a legacy platform vulnerability that cannot be patched.

Which of the following is a vulnerability example?

An unreliable server: An unreliable server is a vulnerability. An exploitable weakness or absence of a defense, such as a USB port that is enabled on the server hosting the database, is known as a vulnerability.

What part of a vulnerability scanner enables administrator control over the scanner?

A client component is used to set up the scan and obtain the report, while a server component is used to schedule the scan and manage the plugins.

To learn more about protocols visit:

brainly.com/question/27581708

#SPJ4

the input is not a valid base-64 string as it contains a non-base 64 character, more than two padding characters, or an illegal character among the padding characters.

Answers

This error message is indicating that the input being used is not a properly formatted base-64 string.

Base-64 is a way of encoding binary data, such as images or files, into ASCII text so that they can be transmitted or stored more easily.

The error message is telling you that the input being used is not a valid base-64 string because it contains one or more of the following issues:

A non-base 64 character: Base-64 uses a set of 64 characters (A-Z, a-z, 0-9, +, /) to represent the binary data. Any other characters that are present in the input are not valid for base-64 encoding and will cause this error.

More than two padding characters: Base-64 uses the "=" character as padding to make sure the encoded string has the correct number of characters. If there are more than two "=" characters present in the input, it is an indication that the input is not a valid base-64 string.

Illegal character among the padding characters: The only valid padding character in base-64 is "=". If any other character is used as padding, it will cause this error.

It is likely that the input string was not properly encoded, or it was encoded with a different method and is not a base64 string. It can also occur if there is a problem with the input string.

Learn more about error here:

https://brainly.com/question/9111443

#SPJ4

james, a supporting technician, is trying to resolve an issue pertaining to the router. on inspecting the issue, he figured that the router was unable to move packages from one node to another. as a resolution to this problem, he intends to follow the osi model for troubleshooting. what layer of the osi model should he inspect to understand the issue relating to the router?

Answers

James, a supporting technician, is trying to resolve an issue pertaining to the router. on inspecting the issue, he figured that the router was unable to move packages from one node to another. as a resolution to this problem, he intends to follow the osi model for troubleshooting. The layer of the osi model that james should inspect to understand the issue relating to the router is The Network Layer

Technicians can be described as a man that skilled professionals who primarily work with technology in different industries. They are knowledgeable about the technical aspects of the many items they work with. They are usually working with electricity or with technological advancements. Technicians may be assigned to do the construction of equipment or materials related to their field of study. They may also be assigned to conduct other maintenance activities and diagnostics to ensure that the equipment works accurately. Technicians may also be required to conduct basic repairs in case of problems. It is esential that technicians have decision-making skills and good analytical skills.

Here you can learn more about technician in the link brainly.com/question/14290207

#SPJ4

a search engine that combines internet technology with traditional library methods of cataloguing and assessing data is known

Answers

A search engine that combines internet technology with traditional library methods of cataloguing and assessing data is known as a metasearch engine.

What is search engine?

A search engine is a computer program that searches documents, such as web pages, for specified keywords and returns a list of the documents where the keywords were found. Search engines allow users to quickly and easily find information online by entering search terms into a search box. The results are usually presented in a list and are commonly known as hits. Search engines use complex algorithms to determine the relevance of the hits to the search terms. They all work by crawling the web and indexing web pages to create an index of contents that can be searched.

To learn more about search engine

https://brainly.com/question/512733

#SPJ4

What organization creates national standards for foodservice equipment?

Answers

The Organization that creating national standards for foodservice equipment is The EPA.

Organization can be described as a collection of people, that involved in pursuing defined objectives. It can be understandable as a social system which comprises all formal human relationships. The organization encompasses division of work among alignment and employees of tasks for instance the ultimate goal of the company.

The Organization can also be defined as the second most main managerial purposes, that coordinates the work of procures resources, employees,  and combines the two, in pursuance of company’s aim.

Here you can learn more about organization in the link brainly.com/question/12825206

#SPJ4

what flag can be used in linux with the passwd command to force a user to change their password on the next logon?

Answers

Answer:

passwd -e <username>

The user will be forced to change the password during the next login attempt.

Explanation:

When two vessels are operating in the same general area, who is responsible for avoiding collision?
a. the operators of both vessels
b. the operator of the stand-on vessel
c. the operator of the give-way vessel
d. the operator of the smaller vessel

Answers

The operators of both vessels is responsible for avoiding collision,When two vessels are operating in the same general area.

According to the International Regulations for Preventing Collisions at Sea (COLREGS), the operators of both vessels are responsible for avoiding collision. Both the operator of the stand-on vessel and the operator of the give-way vessel have a responsibility to take appropriate action to avoid collision. The operator of the stand-on vessel is responsible for maintaining its course and speed while the operator of the give-way vessel is responsible for taking action to avoid collision, such as altering its course or speed. The operator of the smaller vessel is not responsible for avoiding collision. It is worth noting that the stand-on vessel and give-way vessel are terms used to indicate which vessel has the right of way under specific circumstances, but both operators have the responsibility to avoid collision.

Learn more about avoid collision here:

https://brainly.com/question/29784265

#SPJ4

write a program that asks the user for a sentence in english and then translates that sentence to pirate

Answers

The program that ask the user to write a sentence in english is mentioned below.

What is code for english to pirate translation?

This program uses a dictionary to map English words to their Pirate equivalents. It then takes in a sentence from the user and splits it into words. For each word, it checks if the word is in the dictionary and, if it is, it replaces the word with its Pirate equivalent. If the word is not in the dictionary, it leaves the word unchanged. The program then rejoins the words and prints out the sentence in Pirate.

import random

english_to_pirate = {

   "hello" : "ahoy",

   "friend" : "mate",

   "sir" : "me hearty",

   "officer" : "fella",

   "my" : "me",

   "is" : "be",

   "you" : "ye",

   "I" : "me",

   "a" : "a",

   "the" : "th'"

}

def translate_to_pirate(sentence):

   words = sentence.split()

   pirate_words = []

   for word in words:

       if word in english_to_pirate:

           pirate_words.append(english_to_pirate[word])

       else:

           pirate_words.append(word)

   return " ".join(pirate_words)

user_sentence = input("Enter a sentence in English: ")

print("In Pirate: " + translate_to_pirate(user_sentence))

To know more about program visit:

https://brainly.com/question/14588541

#SPJ4

. question 3 in the analyze stage of the data life cycle, what might a data analyst do? select all that apply. 1 point use spreadsheets to aggregate data choose the format of spreadsheet headings create a report from the data use a formula to perform calculations

Answers

A data analyst can do: use spreadsheets to aggregate data, choose the format of spreadsheet headings, create a report from the data, use a formula to perform calculations.

What is data analyst?

A data analyst is a professional responsible for collecting, organizing, analyzing, and interpreting data to identify patterns and trends. Data analysts use statistical techniques, data mining, and predictive analytics to identify meaningful information from large data sets. They use this data to inform business decisions and drive the development of new products and services. Data analysts are also responsible for developing, managing, and maintaining databases, as well as designing and implementing data collection systems.

To learn more about data analyst

https://brainly.com/question/29824383

#SPJ4

allow chrome to access the network in your firewall or antivirus settings

Answers

The Control Panel app's "System and Security" area contains the default firewall for Windows.

What is antivirus software and what varieties are there?

A sort of program called antivirus software was created to safeguard computers against malware including virus, computer worms, spyware, malware attacks, rootkits, keyloggers, and other threats. Antivirus software works to scan for, find, and get rid of viruses off your computer.

What functions does antiviral serve?

A type of software called antivirus is used to stop, scan for, find, and remove malware from a computer. Most antivirus programs automatically execute in the background after installation to offer added security against virus attacks.

To know more about antivirus visit:

https://brainly.com/question/14313403

#SPJ4

cannot read configuration file due to insufficient permissions

Answers

Answer:

Go to the parent folder, right-click and select Properties. Select the Security tab, edit the permissions and Add. Click on Advanced and the Find Now. Select IIS_IUSRS and click OK and OK again. Make sure you have checked Write. Click OK and OK again.

Explanation:

write a program that will calculate the amount of metal needed to cast a hollow sphere. the radius of the sphere and thickness of the shell may vary. prompt the user for appropriate values of radius and thickness, and display the resulting volume of the metal needed

Answers

A program that will calculate the amount of metal needed to cast a hollow sphere are:

#include<iostream>

#include<cmath>

using namespace std;

int main()

{

 double radius, thickness, volume;  

 cout << "Enter the radius of the sphere (in cm): ";

 cin >> radius;

 cout << "Enter the thickness of the shell (in cm): ";

 cin >> thickness;  

 double volume_outer = 4.0/3.0 * M_PI * pow(radius + thickness, 3);

 double volume_inner = 4.0/3.0 * M_PI * pow(radius, 3);

 volume = volume_outer - volume_inner;

 cout << "The amount of metal needed to cast the hollow sphere is " << volume << " cubic cm." << endl;

 return 0;

}

What is program?

A program is a set of instructions that tell a computer how to carry out a task. It is written in a programming language, which is a formal language that is used to communicate with computers.

To learn more about program
https://brainly.com/question/20476366

#SPJ4

What is the value for a network or security administrator to perform password cracking on wireless passwords on their own network? What is the biggest challenge in performing password cracking on pre-shared keys and getting results that are worthwhile

Answers

By guessing or breaking the passwords used to safeguard a computer system or network, password cracking is the process of attempting to obtain unauthorized access to it. Numerous techniques, such as brute-force attacks, dictionary attacks, and rainbow table attacks, can be used to do this.

What is the value for a network or security administrator to perform password cracking on wireless passwords on their own network and the biggest challenge in performing password cracking on pre-shared keys and getting results that are worthwhile?

Performing password cracking on one's own wireless network allows a network or security administrator to evaluate the security of the passwords being used and spot any weaknesses. By discovering and fixing weak passwords that could be used by malevolent actors, this contributes to enhancing network security.

Pre-shared key password cracking can be time- and resource-consuming, requiring a lot of computer power and specialized software. This is the main problem. Pre-shared keys are frequently encrypted as well, making it more challenging to guess the password. Making the procedure even more difficult, the effectiveness of password cracking also depends on the length and complexity of the password.

To know more about password cracking visit:

https://brainly.com/question/13056066

#SPJ4

True or False : the value that excel displays for a cell is always the precise value you enter in the spreadsheet or the precise value resulting from a formula in that cell that is stored by the software.

Answers

The following statement of excel that displays for a cell is always the precise value is false.

What is excel?

Excel is a powerful spreadsheet program developed by Microsoft for Windows, Mac, Android and iOS. It is a versatile application used for a variety of tasks such as data analysis, data visualization, organizing and managing data, creating charts and graphs, and much more. Excel can be used for both personal and business purposes to help organize and analyze data. It is a powerful tool for organizing and tracking data, creating formulas, and performing calculations. Excel can also be used to create forms, and to keep track of business expenses, income, and other financial information. Excel is a great tool for data analysis and data visualization, allowing users to quickly and easily visualize and analyze data.

To learn more about excel
https://brainly.com/question/9799650

#SPJ4

what is the correct syntax to count how many donations of $100 or greater appear in column o (contributions 2018)?

Answers

The correct syntax to count how many donations of $100 or greater appear in Column O is =SUMIF(O2:O210,”>=100″). 1 / 1 point.

What is syntax?

The study of syntax in linguistics focuses on how words or morphemes come together to produce longer language constructs like phrases and sentences. Word order, grammatical relationships, hierarchical sentence construction (constituency), agreement, and nature of cross-linguistic variation, as well as the relationship between meaning and form are among the primary issues of syntax (semantics). There are many different approaches to syntax, each with a unique set of underlying premises and objectives. A syntactic theory is frequently created to address a variety of problems that fall under the rubric of syntax. Different theories approach the relationship between the themes differently, while some of them might not even be thought of as separate but rather as derivations of one another.

To know more about syntax visit:

https://brainly.com/question/3022752

#SPJ4

true or false: every host on a network is assigned a unique character-based name called the fully qualified domain name.

Answers

True

The properly qualified host name (FQDN), sometimes known as the full-qualified domain name (FQDN), is a character-based identifier that is given to each host on a network.

What is network?

A network that is contained inside a very limited region is known as a local area network (LAN). It is typically constrained to a certain location, such a writing lab, building, or school. Servers and workstations are the two primary categories of computers that are networked. In most cases, servers are not directly used by people; instead, they run continually to offer "services" to other computers on the network and their human users. Printing and faxing, hosting of software, file sharing and storage, messaging, data retrieval and storage full access control (security) for network resources, and many other services can be given. Workstations are so named because normally a human user uses them to communicate with the network.

To know more  about network visit:

https://brainly.com/question/13105401

#SPJ4

//write js code to prompt() the user to input a value and capture that value in a variable. display the value of that variable as well //as its data type to the console. refresh the page and type in a number and observe the data type. refresh the page and //type in your name and observe the data type, repeat this process and simply click ok without typing anything, then one more //time and click cancel. what were the data types and why?

Answers

The js code by using prompt(), the user to input a value and capture that value in a variable. display the value of that variable as well //as its data type to the console. refresh the page and type in a number and observe the data type. The code is mentioned below.

What is the use prompt() in this js code?

When the user inputs a number and clicks OK, the data type will be "string" because the prompt() function always returns a string.

When the user inputs their name and clicks OK, the data type will still be "string".

When the user simply clicks OK without typing anything, the value of the variable will be an empty string and the data type will still be "string"

When the user clicks cancel the variable will be assigned "null" value and the data type will be "object"

This is because the prompt() function always returns a string, even if the user inputs a number or a name. JavaScript does not have a separate data type for strings and numbers, so the user input will always be a string.

And when the user click cancel, the prompt function will return "null" and null is considered as an object by javascript.

let userInput = prompt("Please enter a value:");

console.log("Value:", userInput);

console.log("Data type:", typeof userInput);

To know more about prompt() visit:

https://brainly.com/question/30085583

#SPJ4

which organization is responsible for allocating public ip addresses?

Answers

IANA allocates IP addresses to the five Regional Internet Registries (RIRs), which are responsible for allocating IP addresses to organizations within their respective regions. These RIRs are:

The American Registry for Internet Numbers (ARIN) for North AmericaThe Réseaux IP Européens Network Coordination Centre (RIPE NCC) for Europe, the Middle East, and Central AsiaThe Latin American and Caribbean Internet Addresses Registry (LACNIC) for Latin America and the CaribbeanThe Asia-Pacific Network Information Centre (APNIC) for the Asia-Pacific regionThe African Network Information Centre (AFRINIC) for Africa

These RIRs then allocate IP addresses to Internet Service Providers (ISPs), who in turn allocate IP addresses to individual organizations and households. This hierarchical system ensures that IP addresses are allocated efficiently and fairly, and allows for the growth and expansion of the Internet. The Internet Assigned Numbers Authority (IANA) is responsible for allocating public IP addresses. IANA is a department of the Internet Corporation for Assigned Names and Numbers (ICANN), a non-profit organization that coordinates the maintenance and methods of several databases related to the namespaces of the Internet, ensuring the network's stable and secure operation.

Learn more about ip addresses: https://brainly.com/question/16011753

#SPJ4

the mit database gives a t-test value of 2.581, which correspond to a p-value of 0.01 for your null hypothesis. according to the hypothetico-deductive approach, what is the next step you should take?

Answers

The t-test results from the mit database are 2.581. The next thing you should do, in accordance with the hypothetico-deductive method, is to reject your null hypothesis.

Describe a database.

A database is an accumulation of information that has been set up to be easily updated and managed. Statistics records or files comprising information, such as sales data, client data, financial records, and product descriptions, are frequently combined and kept in a plethora of databases.

Why we need databases?

They simplify and reliably update accurate data thanks to their assistance. They offer security measures that help us prevent duplication by limiting access to information. All of the equipment, helpers, and facilities used in SQL databases are collectively referred to as database tools.

To know more about database visit:

https://brainly.com/question/6447559

#SPJ4

1. the security awareness and training policy is implemented for which nist functions and sub-categories?

Answers

The security awareness and training policy is typically implemented for the NIST function of "Identify" and the sub-category of "Awareness and Training" within that function.

What number of NIST security controls exist?

Over 1000 controls make up the five iterations of NIST SP 800-53. This list of security measures enables federal government agencies to implement the privacy and security measures that are suggested for federal information systems and organizations to safeguard against security threats and cyberattacks.

What main purposes does security awareness training serve?

Training in security awareness helps to reduce risk, preventing the loss of PII, intellectual property, money, or brand reputation. An efficient cybersecurity awareness program covers the errors that staff members may commit when utilizing email, the internet, and the real world, such tailgating or incorrect document disposal.

To know more about NIST visit:

https://brainly.com/question/13507296

#SPJ4

Which of these KPIs demonstrate engagement? Choose all that apply.
a. Direct sales revenue from social media.
b. Mentions.
c. Sharing and retweets. d. Likes or Favorites. e. Customer satisfaction.

Answers

One of the most frequent and possibly the most aggravating problems with social media is coming up with new content ideas.

Key Performance Indicators (KPI) must be reviewed and adjusted for the business process once every 18 months. KPIs must be regularly monitored and maintained in order to continue operating at their peak. accentuate the mistake of the rival, letting your fans know, "See this? We wouldn't do this at all. Continue to be helpful and feel sympathy for the company's errors. When appropriate, respond to posts with consideration and empathy. Cyberbullying, image-based abuse, and other typical social media issues are all well-explained by the Office of the eSafety Commissioner.

Learn more about performance here-

https://brainly.com/question/14617992

#SPJ4

which method in java could be used by itself to assign the value of 123 to each and every location of an array

Answers

Java's fill() function can be used to give the value 123 each and every place in an array on its own.

What is Java, exactly?

Millions of devices, including laptops, smartphones, gaming consoles, medical equipment, and many more, employ the object-oriented programming and software platform known as Java. Java's syntax and principles are derived from the languages C and C++ language.

With the fill() method, we repeatedly loop through an empty array, inserting the same object at each location. Programmers frequently utilize this as it makes it easier to place their specific value at each point.

The java.util.Arrays class contains the fill() function.

Arrays.fill(array name, value); is the syntax.

Regarding alternative approaches:

Pushing elements into a stack, array, linked list, etc. is done with the push() method. The Java.util method can be used to add an element toward the stack. Stack. It will added to the peak if you push (E el).

.We utilize put().

Put a key-value pair into a Map with put(key, value).

Attach the provided string to that other phrase at the end using the append() method. String name.append(string to be appended) is the code for this.

To know more about Java visit:

https://brainly.com/question/29897053

#SPJ4

what happens if your computer attempts to telnet to an inactive ip address on your network segment? does your computer send out a tcp [syn] packet?

Answers

Yes, when a computer attempts to establish a Telnet connection to an inactive IP address on its network segment, it will send out a TCP [SYN] packet. If there is no response from the inactive IP address, the computer will eventually timeout and no connection will be established.

What is Telnet connection?

A network protocol called Telnet is used to connect to computers remotely through the Internet. Users can log in to a remote host using this method and provide commands as if they were actually at the host.

When a user installs Telnet client software on their computer, the client initiates a Telnet connection by sending a TCP [SYN] packet to the server (the remote host). The client confirms receipt of the packet with a [ACK] packet after the server answers with a [SYN, ACK] packet. The client is now able to transmit Telnet commands to the server because a full-duplex connection has been established between the client and the server.

Telnet is an insecure protocol since no encryption is used during data transmission between the client and server. The implication of this is that all data delivered through a Telnet connection, including passwords, is susceptible to interception and reading by unauthorized persons. As a result, other, more secure protocols, such Secure Shell (SSH), have replaced Telnet as the preferred method of remote access.

To know more about Telnet connection visit:

https://brainly.com/question/16268685

#SPJ4

i fr just asked a question.. about math how did i do something?? please someone help me out here

Answers

I doubt ur account will get deleted I’ve had many questions and answers deleted on my multiple accounts but never have I been deleted only suspended for 24 or 48 hours at a time

when using inferential statistics, what is the default position on the difference between two measurements?

Answers

The default position on the difference between two measurements when using inferential statistics is that there is no difference.

What is inferential statistics?

Inferential statistics is a branch of statistics that uses sample data to make inferences, or generalizations, about a population. It involves making predictions, drawing conclusions, and testing hypotheses based on sample data. It is used to draw conclusions from a smaller sample size to the larger population. Inferential statistics can help researchers gain insight into a population by analyzing sample data to draw meaningful conclusions about that population. It can be used to identify trends and relationships between variables, to make predictions, and to test hypotheses. It is an important tool for making decisions based on data.


To learn more about inferential statistics
https://brainly.com/question/14568632
#SPJ1

a data analyst wants to convert their r markdown file into another format. what are their options? select all that apply. 1 point html, pdf, and word dashboard slide presentation jpeg, png, and gif

Answers

The data analyst can convert their R Markdown file into HTML, PDF, Word, Dashboard Slide Presentation formats.

Options: HTML, PDF, Word, Dashboard Slide Presentation

The data analyst can convert their R Markdown file into multiple formats such as HTML, PDF, Word, Dashboard Slide Presentation, as well as image formats like JPEG, PNG, and GIF. This allows them to easily share their data analysis in the format that best fits the needs of their audience.

Furthermore, the R Markdown file can also be used to embed HTML and JavaScript code, allowing the data analyst to create interactive visuals that can be used to further explain their data analysis.

Learn more about data analysis: https://brainly.com/question/14724376

#SPJ4

How has the integration of robotics in manufacturing affected productivity and how does it relate to technology transfer?

Answers

Answer:

The use of robotics will increase productivity and has the potential to bring more manufacturing production work back to developed countries. As productivity increases, labor is likely to receive a significant share of the benefits.

Explanation:

for a list of 500 numbers, at most how many guesses would it take using binary search to guess the secret number if after each guess you were told whether your guess was too high or too low or just right?

Answers

At most, it would take 9 guesses to find the secret number using binary search.

What do you mean by Binary search? Explain.

Binary search is an efficient algorithm for searching for an element in a sorted list. In each step of the algorithm, the middle element of the current search range is selected and compared to the target element. If the middle element is equal to the target element, the Binary search is successful. If the middle element is greater than the target element, the search continues in the lower half of the current range, and if it is less, the search continues in the upper half.

With a list of 500 numbers, the first guess would be the middle number of the list (250), if the secret number is higher, next guess would be the middle of the upper half (375), and so on. With each guess, the search range is halved, so the number of steps required to find the secret number is at most log2(500) = 9.

To know more about Binary search, visit:

brainly.com/question/13152677

#SPJ4

1. Information such as the name, address and contact number of a person is known as (a) data source (c) letter (b) main document (d) finished document 2 ) Needs to be created for mailing or sending letters to various people. (b) Main document (a) Recipient list (c) Letter (d) None of these 3. The text which we have to send to all the addresses is present in the (a) main document b) computer (c) data source​

Answers

Data that will be integrated into the output documents is contained in a database called the recipient list. Names, addresses, phone numbers, and other types of personal data are often listed in this database.

How do databases function?

A database is a systematic collection of data. Databases make data administration easy.

Consider a database as an illustration. An online telephone directory uses a database to store data on persons, their phone numbers, and other contact information. Your energy service provider manages billing, customer-related concerns, defect data, etc. via a database.

It is necessary to save, modify, and present information on members, their friends, member actions, messages, advertisements, and much more. We are able to use databases in countless different ways.

To know more about Database, visit:

https://brainly.com/question/30051761

#SPJ1

Other Questions
According to this historian, what was the impact of thesettlement of Oregon Country?It caused settlers to become more patriotic andloyal to the United States. O It led to people of different backgrounds workingtogether to survive. It resulted in pioneers feeling superior to those whohad chosen to stay back east. It created distance between pioneers and keptthem apart what is the apparent weight of a 72 kg passenger at the lowest point of the circle? express your answer in si units. Shower thoughts. Worth 100 points Please write any shower thoughts you have yourself or make a list of at least 10 of your ownExamples:Once you complete your goals what's next? Isnt anyone afraid of what's next? Of screwing up so bad that it ruins everything?Why do we as humans always want to be something we can never be? Or why do we always want things we can never have?Why do we hate pressure but when it comes to others we put pressure on them knowing that if that was us we would break?You can tell someone a million times how pretty and amazing they are, but if they were told one time they were ugly then theyre always going to think back to that one time even if it wasnt that big of a deal. Theres always going to be doubt.Just because you think someone is pretty doesnt mean they know it.If you are afraid to ask something, just remember that you dont know the answer or outcome until you have acted.You can like multiple people at once but loving someone is different you can only love one person with all your heart.When someone loses feelings for you it doesnt mean they didnt like you at all, it just means they didnt love you.Imagine if someone bottled all your tears every time you cried, whether it was because you were hurting or because you were happy. Imagine how full that bottle would be so others.You cant make someone love you, the only thing you can do is not ruin it with themYou can smile and laugh and pretend everything is fine even when it isnt. But just know when you do that you only are hurting yourself more by pretending.You cant expect people to take responsibility for your mistakes.Just because they are smiling and laughing doesnt mean they are okay. Sometimes you got to ask someone if they are really okay.We as humans could have it all and still not be happy. Because nothing is ever enough for us.If you want someone to understand you just say how you really feel holding it in sucks and is just painful.Asking is better than hiding.What if you could make someone's day just by telling them how amazing they are?Dont run from your problems when you do that; you're just making your problems even worse.You can give up on everything but in truth you wont ever give up on the people you care about.The only reason why people who cut only cut deep enough to feel pain is because they dont want to actually die, they just need a way to deal with their emotional pain.Loving someone isnt loving them for the things you like about them, its about loving everything about them even when they make mistakes.To stop your mind from wandering keep your eyes still. It actually works.When you feel like you cant breathe, dump your head in a bowl of cold water.You can change yourself a lot by doing instead of wishing. How does zinc react with oxygen? The pseudostratified columnar epithelial tissue that contains cilia on the surface is known as the ciliated pseudostratified columnar epithelium. True Or False Note: Sound waves are not shaped quite like the waves, but we will use this shape because it is easy to see their characteristics on paper. Does the sound wave above experience a change in pitch or loudness? Why? (Science)Need help asap! it is illegal to coast downhill with the transmission or gears in neutral. after the previous sales representative in his territory infuriated an important customer, sonja visited the customer once a month, never asking for business but hoping to rebuild trust through listening and expressing concern. finally, after more than two years, the customer gave sonja an order. sonya was providing the important marketing function of How do you write 7 in maths? in 2016, there were about 43,500 cinema screens in a country. If about 37.7% of the total screens in the country were digital 3-D screens, find the approximate number of digital 3-D screens. If someone is in a subordinate position to someone else, which of thefollowing statements must be true? Base your answer on the meaning ofsubordinate. O The subordinate person is under the control of the other person. The subordinate person holds the same job as the other person. O The subordinate person supports and cares for the other person. O The subordinate person has total authority over the other person. how would you describe the structure of DNA to an elementary school child? can you get pulled over for not wearing a seatbelt 2Part 5: Independent PracticeHow is Odilia similar to Odysseus? is the binomial 7+1 equal to the trinomial 3x^2-2x+1 What was a responsibility of the Federal Reserve Bank? A. To loan money to private banks B. To print money C. To lessen economic crisesD. All of the above Why did Germany sign a nonaggression pact with the Soviet Union ? How does the use of technology in industry benefit producers more so than consumers? how did the fourteen points address the policy of isolationism? Jefferson begins the majority of the paragraphs in the declaration of independence with the words he has. why is this structure effective in helping Jefferson make his argument