What is ADO.net????????​

Answers

Answer 1

Answer:

ADO.NET stands for ActiveX Data Object is a database access technology created by Microsoft as part of its .NET framework that can access any ...

Developer: Microsoft Corporation


Related Questions

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

True or false we can used virus not use pirated software and programs ​

Answers

Answer:

False i guess

write one function each of caps lock and shift keys.

Answers

Answer:you can use the shift key to use symbols instead of numbers on the top numbers part of the keyboard

Explanation:

Some Examples are ( ) $ &

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to

Answers

Answer:

Tell about an experience with a computer virus.

Explanation:

Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.

In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.

Thus, the correct answer is the first option.

Answer:

b

Explanation:

an interface are connection point with hardware devices are joined​

Answers

Answer:

Explanation:

Networking hardware is the correct answer

You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?

a. motherboard
b. CPU
c. graphics card
d. sound card

Answers

Answer:

all options

a, b and c the most important

Explanation:

How the data is converted into the information?​

Answers

Answer:

the data is converted into information by data processing

Answer:

by data processing

Explanation:

data is converted to information by analyze or manipulate data by combining with other data and using experience

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

Which of the following is not a networking equipment?

Answers

Answer:

[tex]\boxed{\sf (C) \ mouse}[/tex]

Explanation:

A networking equipment can share data along a computer network. A mouse is not a networking equipment.

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)​

Answers

Answer:

Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.

However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.

Explanation:

Here's how to set Call Forwarding on your android

Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'

What are the advantages of Radio waves over micro waves?​

Answers

Answer:

radio frequencies can penetrate deeply into the material and thus heat thick products. They heat more slowly than microwaves and thus make it possible to treat more delicate products which require a slower heating.

The term platform as a service has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider. Select one: True False

Answers

Answer:false

Explanation:

block diagram of a computer


Answers

Answer:

this the answer for you.

mark me as a brainlist plz.

Universal containers uses a custom object named Insight, which is the child in a master-detail relationship with the opportunity object. Sales teams use this object to create requests for analysts who conduct supporting research regarding an opportunity. Sales teams use Salesforce1 mobile app and want to easily create new insight records from their phones. What should a consultant recommend to meet this requirement

Answers

Answer:

A. Create a custom object tab.

Explanation:

The custom object refers to an object in which a person creates to store the data and information i.e relevant for the business organization

While the custom object tab is a tab in which the data stored is displayed in the records of the custom object

Therefore according to the given situation,  since the sales teams used the mobile app and want to create new insight records by using their phones

So for meeting this we should recommend creating a custom object tab

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?
(Correct answer only)

A. magazine
B. newspaper
C. flier
D. billboard
E. brochure

Answers

Answer:

D. billboard

Explanation:

Commuters can most likely see billboards from a distance.

The print medium to be chosen by the felicity should be Billboard. Thus, option (D) is correct.

What is billboard?

Billboard is a HORDING and huge outdoor advertisement board That can be seen by many people. In order to be seen by the most automobiles and pedestrians, billboards are frequently erected in busy places like highways and urban areas.

Many of the company publish their brands and products on the billboard for spreading brand awareness and spreading the word of their company  to as many people can know about the product.

According to the above scenario, Felicity can capture the attention of the regular subway commuters in her area through billboard advertisement. From a distance, commuters can see the advertisement.

Therefore, it can be print medium to be chosen by the felicity should be Billboard. Hence, option (D) is correct.

Learn more about Billboard here:

https://brainly.com/question/8494411

#SPJ2

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobile devices. However, the group is in an area where Wi-Fi Internet is not available and cellular coverage is intermittent. One of the travelers has an unlimited cellular data plan and a strong consistent signal. Which of the following methods would most likely be implemented to provide Internet service to the group?a. Cell phone tetheringb. Satellite Internetc. Mobile hotspotd. Cell phone tethering

Answers

Answer:

c. Mobile hotspot

Explanation:

A mobile hotspot is a hotspot that is to be activated by turning on the WiFI hotspot. It is used to share the cellular data to the laptop, computer system and the mobile devices who do not have an internet connection

Since in the question, it is mentioned that the one traveler has an unlimited cellular data plan and a consistent strong signal

So the mobile hotspot should be used to provide internet service to the group.

convert (0.255)¹⁰ into binary

Answers

0.01000001010001111011

Must click thanks and mark brainliest

What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders

Answers

to own businesses and to be responsible for employees

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?

Answers

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

The marketing department has hired a new employee. Prior to the new employee's first day at work, you have set up and configured a new laptop computer. The computer and all of the peripherals were purchased from the same vendor. After the new employee begins work, you receive a phone call stating that the wireless mouse is not working.

Which of the following is the MOST likely reason the mouse isn't working?

A. The USB mouse driver is too old for the current mouse.
B. The USB mouse is not a wireless mouse and needs to be plugged into the computer.
C. The USB mouse is malfunctioning.
D. The USB mouse receiver is not plugged into the computer.

Answers

Answer:the usb mouse receiver is not plugged into the computer

Explanation:

In the case above, one can say that the USB mouse receiver is not plugged into the computer.

What is a USB mouse?

A USB mouse is known to be a tool that is often attaches to a computers USB port.

In the case above, one can say that the USB mouse receiver is not plugged into the computer and as such it cannot perform the task it need to do.

Learn more about USB mouse from

https://brainly.com/question/10847782

#SPJ9

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Design a webpage on Artificial Intelligence/augmented reality

Answers

Answer: is there even an answeR for this? Anyway plz do my question. If you are looking for web page options thou I would offer a Alexa vs VR

Explanation:

Having a skilled labor force is one of the ________________ impacts of technology on the workplace.
negative
positive

Answers

The answer is positive

Answer:

negative

Explanation:

this is because not many people have the skills to operate the machines. In short not everyone is able to operate them

what are the uses of mobile phones?​

Answers

Answer:

We use mobile phones to:

1. communicate with our friends and family

2. looking for the information/news in the world

3. looking for the material for study

and many others

may it helps^_^

Answer:

Mobile phones are used for a variety of purposes, such as keeping in touch with family members, for conducting business, and in order to have access to a telephone in the event of an emergency. Some people carry more than one mobile phone for different purposes, such as for business and personal use.

Explanation:

Plz mark me as brainiest

Still giving out the brainly thing :)
just answer its as simple as that and you get points :)

Answers

Answer:

The answer to that my friend, Is 0 :D

Explanation:

Answer:

4/4

Explanation:

Other Questions
In annual Student vs. Faculty Kickball game, Brian kicked a ball that was in the air for a total of 4.5 seconds before it landed on the ground. Assuming that the ball left from the ground (initial height=0) which of the following was the initial vertical velocity of the ball? HINT: Use the height equation for English units. Using the ICD-10-CM code book, identify the main term for the following diagnosis:Office NoteThis 19-year-old female has been complaining of right ear pain for 3 days and feeling tired.EXAMEYES: Appear normalNOSE: No findingsCERVICAL LYMPH NODES: UnremarkableEARS: The right ear shows otitis media is present.DIAGNOSIS: Acute serous otitis mediaPLAN: Antibiotics and drops given. Instructed to return in 10 days. List the main term used to locate information in the Alphabetic Index _____. Changes that Affect the body may take place where Which of the following would be a thesis statement? aIn this essay, I will show that prospective pet owners should adopt an animal from a shelter. bPuppies purchased from puppy mills often carry fatal illness such a heartworm and parvovirus. cProspective pet owners should consider adopting an animal from a a shelter in order to ensure that their pet is healthy. data related to the inventories of alpine ski equipment and supplis is presented below 180000 the inventory of skis would be valued at Explain this quotation from the writer Norman Cousins: "History is a vast early warning system."help please the US was successful in containing communism in what country Please solve this question by using the strategy Elimination Method or Solve By Substitution. This is the math equation: 1/2x+y=15 and -x-1/3y=-62nd Question: 5/6x+1/3y=0 and 1/2x-2/3y=3 Is pi + 1 rational or irrational Need help with corrections, my teacher is giving me a hard time :(20. Escribes el correo electrnico a su amigo? Si, le escribo el correo a su amigo.teachers message: Do you write an email to your friend? What is the direct object? What is the indirect object? What are their pronouns? Show me:Subject:Verb:Direct object:Direct object pronoun:Indirect object:Indirect object pronoun:Now rewrite the sentence using the IOP and DOP21. Compras la bebida para tu hermana? Si, le compro la bebida para ella.teachers message: Same thing here. Do you buy the drink for your sister? Show me:Subject:Verb:Direct object:Direct object pronoun:Indirect object:Indirect object pronoun:Now rewrite the sentence using the IOP and DOP Say we decided to expand our study and asked ten more urban homeowners what they pay each month for rent. Assume the sample deviation remains the same. What will happen to our samples standard error This passage introduces Perseus, the main character of todays myth, and Dana, his mother. Finally one day the little boy his name was Perseus was discovered by his grandfather. "Your child!" Acrisius cried in great anger. "Who is his father?" But when Dana answered proudly, "Zeus," he would not believe her. Perseus, Edith Hamilton Based on what you know about Greek gods, why is Dana proud that her sons father is Zeus? Zeus has very few children. Zeus has human qualities. Zeus is the king of the gods. 20. Fill in the blank in the following sentence with either the subjunctive or indicative form of the verb querer. Es obvio que Ral no _________ sacar una buena nota. 8.Find the nature of the roots of the quadratic equation(1 Point)2570x25x70ImaginaryReal and EqualReal and UnequalNone of Theseplease give the answer as fast as you can please how are phenotypes impacted by mutations Qu resistencia debe ser conectada en paralelo con una de 20 para hacer unaresistencia combinada de 15 ? Write the equation for the line that passes through the points (4, 5) and(6,9). *O y = 2x-3O y = 0.5x - 3O y = 0.5x + 6O y = 2x + 6None of the Above Translate this phrase into an algebraic expression. Five more than the product of 8 and Vanessa's savings Use the variable v to represent Vanessa's savings. Find 0.01 more than 9.154 southerns who were for redemption wanted which of the following