which microsoft azure service is a eelational service that allows for rapid creation of relational databasses and apps

Answers

Answer 1

Answer:

Azure SQL Database

Explanation:


Related Questions

How many words is 3 pages double spaced times new roman 12?.

Answers

Have a good day tomorrow babe love love babe love baby babe love you baby baby babe babe

Which is true regarding how functions work? Group of answer choices A return address indicates the value returned by the function If a function returns a variable, the function stores the variable's value until the function is called again After a function returns, its local variables keep their values, which serve as their initial values the next time the function is called A function's local variables are discarded upon a function's return; each new call creates new local variables in memory

Answers

The true statement is that A function's local variables are discarded upon a function's return; each new call creates new local variables in memory.

What is function?

A function is known to be a term that tells the linkage between a set of inputs that are known to have one output each.

It is known to show the relationship between inputs where each input is said to be linked to one output. Note that a function's local variables are removed from memory when a function's return.

Learn more about function from

https://brainly.com/question/25638609

You are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. The students use the computers to search the internet for research paper content. The school budget is limited. Which content filtering option would you choose?

Answers

Answer:

I would use a manually created blacklist.

Filters like those found in Internet Explorer and Netscape can help users block out objectionable or obscene material. In this situation, I could add my own web addresses to the list of blocked sites.

Another method of filtering would be to install hardware-based filters that look for certain keywords in a user's browsing history and flag that information as unacceptable. This would give me more control over what is blocked, but again would not allow me to personally review each page flagged by the filter before it became available to students.

I would go with a manual blacklist because it will provide an extra level of protection to the computer lab without being very cumbersome or prone to bugs.

Explanation:

My own original answer.

one of the safest and easiest investments for young people is

Answers

Answer:

Young investors have the single most valuable resource on their side⁠—time. Compound interest and dividend reinvestment are proven methods of building long-term wealth.

What was one factor that led to more people seeking jobs in cities and factories?
do any of you gies know how to bet Arceus in legend Arceus

Answers

Answer:

The balance of Economic and political power shifted from agriculture to manufacturing, making industry and cities grow.

What asks users to write lines of code to answer questions against a database?.

Answers

Answer:helps users graphically design the answer to a question against a database. structured query language (SQL). 

Explanation:

Please help!!! Question 8

Answers

Answer: To break out of some block of code.

True or false: Securing intellectual property digitally is the only security because that's how all IP is stored.

Answers

Intellectual property includes inventions, ideas, and writings. So you could use patents, trademarks, or copyrights to protect these things.

Technology that transfers page images composed inside a computer directly to printing plates is called:

Answers

Technology that transfers page images composed inside a computer directly to printing plates is called Computer-to-plate.

What is Computer-to-plate?

Computer-to-plate (CTP) is known to be a kind of modern imaging technology. It is known to be used in the area of modern printing processes.

This technology is one that often forms an image suing a Desktop Publishing (DTP) application which is the output to a printing plate. In the CTP procedure, the plates are said to be made from a variety of materials that is from aluminum to polyester.

Learn more about Technology from

https://brainly.com/question/25110079

help pls
cmu cs 0
4.1.2.1 Creating Groups checkpoint 1

Answers

Answer: For each group, you want to add, click the [ +] sign and select it from the list that shows. A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic between its multiple interfaces.)

Explanation: The Check Point Rule Base must not have these objects. If it does, the Security Management Server will not generate Access Lists. OSE devices report their network interfaces and setup at boot time. Each OSE device has a different command to list its configuration. You must define at least one interface for each device, or the Install Policy will fail.

10 effects that you can find in Audacity.

Answers

Answer: Distortion.

Echo.

Limiter.

Paulstretch (extreme stretch)

Phaser.

Reverb.

Reverse.

Truncate Silence.

etc

Explanation: this is it

To include a column in the output that is not a result of an aggregate calculation, it must be included in the _____________ clause.

Answers

Answer:

group by

Explanation:

Compare the freedom available to the American media with the freedom available to media in other parts of the world. How does a country’s political scenario affect the freedom of media?
ASAP

Answers

in america we are free to say most of whatever we want in media becuase we have free speech here. in other countries, they don't have freedom of speech,and sometimes it also has to do with the political situation. like say in china, where teenagers arent allowed to use the internet for more than a certain amount of time,and arent allowed to talk to each other. thats becuase of the fact that that country is a communist country and the government wants much more control than in other countries.

What does it mean when your excel table has headers?.

Answers

Answer:

A table header is a row at the top of a table used to label each column.

Explanation:

The internet is based on which three key technologies?.

Answers

The internet is based on the client/server computing, the packet switching, development of the communications standards for the linking networks and the computers

What is the internet?

The internet is a vast network that connects computers all across the world. It is a wide and open network that can be used to share, communicate and transfer information or data.

The internet is made on HTTP client/server computing, the packet switching, and standards for linking networks and computers TCP/IP, HTTP.

Find out more information about the internet.

brainly.com/question/1757772

In which type of attack does a person, program, or computer disguise itself as another person, program, or computer to gain access to a resource

Answers

deepfake

Explanation:

a deepfake is when an AI or robot makes an image that looks EXACTLY like a person,or can replicate its voice. does this help?

name any two software programs that employees can use to communicate effectively ​

Answers

Answer

unified communication software or video conference.

Explanation:

Which one of the following does NOT contain a
battery of some type?
A. Portable printer
B. Wired keyboard
C. UPS
D.
iPod

Answers

Answer:

B

Explanation:

took the test a day ago

it would be B. since it’s wired.

The ________ loop is a good choice when you do not want the loop to iterate if the condition is FALSE in the beginning.

Answers

Answer:

while

Explanation:

The while loop is a good choice when you do not want the loop to iterate if the condition is FALSE in the beginning.


Should spreadsheets be used to maintain a checkbook?
YES

NO

Answers

Yes, because it keeps all your data organized and allows you to see the trend and growth of your data by automatically creating different types of charts and graphs to help you visualize your data.

Hope that helps!

What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?.

Answers

Answer:

Application software

Explanation:

i think

Can someone please help me with this question?

Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are something to be afraid of? Why or why not?

Answers

Answer:

There are many good reasons to fear or not fear computers that are controlled by AI.

Fear:

The AI can do things without people asking it to.The AI could be hàcked into, making it easier for hàckers and scam.mers to get into the computer and take information.TBH, I don't really like things that aren't natural and/or created by God.

Don't Fear:

AI's can do many things that humans cannot do.AI's can do things faster and more efficiently than humans can.AI's can be used to help us with many things that are impossible or very hard for humans to do.

Explanation:

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

−Kallmekrish

The purpose of cache memory is to keep handy the most recently accessed data and instructions so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the ____ of a Web browser.

Answers

Answer: Bookmark File

Explanation: Cache is like short term memory, like history on a web browser. You can manually clear it, just like on the web. If you bookmark a file though, it gets saved to memory, and you can call on it later

Identify a characteristic that is a disadvantage of cloud-based hosting.

Answers

The characteristic that is a disadvantage of cloud-based hosting is  loss of control over data location.

What is Cloud hosting?

This is known to be a kind of applications and websites that often makes them accessible via cloud resources. Here, a network of linked virtual and physical cloud servers is said to be the one that host the application or website.

The Disadvantages of cloud computing are:

There is a data loss or theft.There is also data leakage.There is account or service hijacking, etc.

See options below

a. ongoing support costs

b. increased management requirements

c. significant development effort

d. loss of control over data location

Learn more about cloud-based hosting from

https://brainly.com/question/19057393

What is lost when the computer is turned off

Answers

Answer:

your computer's RAM loses its data when the power is off

Hurrryyy pleasee!!!!

Answers

Answer:

Show the answer choices

Explanation:

Show the answer choices please

Write JAVA code that will randomly place a blue dot into a circle of radius 100 centred on a square black canvas of side length 500. See attached picture:

Answers

Answer:

// Drawing (or printing) texts on the graphics screen:

drawString(String str, int xBaselineLeft, int yBaselineLeft);

// Drawing lines:

drawLine(int x1, int y1, int x2, int y2);

drawPolyline(int[] xPoints, int[] yPoints, int numPoint);

// Drawing primitive shapes:

drawRect(int xTopLeft, int yTopLeft, int width, int height);

drawOval(int xTopLeft, int yTopLeft, int width, int height);

drawArc(int xTopLeft, int yTopLeft, int width, int height, int startAngle, int arcAngle);

draw3DRect(int xTopLeft, int, yTopLeft, int width, int height, boolean raised);

drawRoundRect(int xTopLeft, int yTopLeft, int width, int height, int arcWidth, int arcHeight)

drawPolygon(int[] xPoints, int[] yPoints, int numPoint);

// Filling primitive shapes:

fillRect(int xTopLeft, int yTopLeft, int width, int height);

fillOval(int xTopLeft, int yTopLeft, int width, int height);

fillArc(int xTopLeft, int yTopLeft, int width, int height, int startAngle, int arcAngle);

fill3DRect(int xTopLeft, int, yTopLeft, int width, int height, boolean raised);

fillRoundRect(int xTopLeft, int yTopLeft, int width, int height, int arcWidth, int arcHeight)

fillPolygon(int[] xPoints, int[] yPoints, int numPoint);

// Drawing (or Displaying) images:

drawImage(Image img, int xTopLeft, int yTopLeft, ImageObserver obs);  // draw image with its size

drawImage(Image img, int xTopLeft, int yTopLeft, int width, int height, ImageObserver o);  // resize image on screen

Explanation:

There was an error that prevented this video from playing espn.

Answers

Answer:

That tends to happen because brainly does not allow videos, rather only pictures. Otherwise, there is no way to provide video through brainly questions or answers.

Different Betweens in SRAM and DRAM !






Thank!
[tex] \: \: \: [/tex]

Answers

Answer:

Explanation:

Application Differences:

SRAM

SRAM stands for Static Random Access Memory  DRAM stands for Dynamic Random Access Memory

Faster access is due to the usage of transistors to store single bit of data  

SRAMs are used for cache memories due to faster access time  

DRAM

DRAM stands for Dynamic Random Access Memory

DRAMs are used for main memories due to comparatively slower access time.

DRAMs use capacitor to store bits where each capacitor holds a single bit

Parameter differences  

Speed: SRAMs are faster due to presence of transistors. DRAMs are slower due to presence of capacitors

Size: Due to complexity involved in the internal circuits, SRAMs are smaller in capacity for same size of the chip. DRAMs are larger as compared to SRAMs since their capacity for a given physical size is more.

Cost: SRAMs are costlier and the per bit storage cost is more than that of the DRAMs. DRAMs are cheaper and the per bit storage cost is less than that of the SRAMs

SRAM :

SRAM has lower access time, so it is faster compared to DRAM.SRAM is costlier then DRAM.SRAM requires constant power supply, which means this type of memory consumes more power.Due to complex internal circuitry, less storage capacity is available compare to the same physical size of DRAM memory chip. SRAM has low packaging density.

DRAM :

DRAM has higher access time, so it is lower than SRAM. DRAM costs less compair to the SRAM.DRAM offers reduced power consumption, due to the fact that the information is stored in capacitor.Due to the small internal circuitry in the one-bit memory cell of DRAM, the large storage capacity is available.DRAM has high packaging density.

Hope Helps!!

Legacy systems can be described as all of the following except? Usually found on a mainframe. Old systems that often require hard-to-use command languages. Systems that most often have detailed information that can be accessed by a system at a higher tier. A system that often holds the middle tier of a multiple-tier system. A system that is already in place, from the past.

Answers

A legacy system refers to outdated infrastructure, applications, and processes, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

What is a legacy system?

It describes software or IT systems that have been around for a long time and that, from a technological point of view, should be replaced by a more modern version.

A legacy system has often been used for a long time and is no longer technologically up to date, however these old applications are still used for various reasons, for example because they form the basis of newer software.

Therefore, we can conclude that legacy systems are those computer systems that have become outdated but are still used by companies, "a system that often holds the middle tier of a multiple-tier system" is not a characteristic of this system.

Learn more about legacy systems here: https://brainly.com/question/7494597

Other Questions
MARKING BRAINLY!! Ivy is on a tour of a huge art museum. She wanders into one corridor and notes that the walls are covered with beautiful stained glass, depicting different Bible stories. Ivy gets a text message from her mom asking what part of the museum she is in. Which area is Ivy MOST likely touring right now? 12.5=-1.5+b/0.1 solve for b an important Chinese shipping port No results found for Evaluate when x = -3 and y= -1: x-xy A. -4 B. -3 C. 0 D. -6 Mike had 16 video games but 9 of them werent working. If he wanted to sell the working games for $7 each, how much money could he earn? 5) What is MOST likely the author's purpose for writing such a story? A) to compare the past with the future when it comes to hunting on someone else's land B) to convince the reader that some people just can't get along no matter how hard they try C) to encourage everyone in the world to love one another or people may all end up fighting against each other D) to illustrate the irony of how one person's heart that has remained hardened nearly his entire life against someone can find enough compassion in it to forgive Which of the following is not a step in summarizing?A. Make a graphic organizerB. Uge direct quotes from the textUGOC. Find the main ideasD. Write a sentence that summarizes the main idea of the whole text Find the solution of the system of equations. 3x+y=-15 3x+2y=-18 In a class library, 3 out of 4 books are non-fiction. The rest are fiction. a) How many non-fiction books could there be? How many fiction books could there be? b) How many different answers can you find for part a? Which answers are reasonable? Explain. In the diagram, how many angles are alternate exterior angles with angle 5?zeroonetwothree i need help please it over due What is the european union and what is its purpose. write a letter to your friend and give two reasons why he should come to your school Guys I really need help with this it's an emergency!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! 2+2=? Read the selection below.write a description of each character and setting in the story The ant and the grasshoperCharacter. Description1._______. ________2._______ ________Setting Description3.__________ _________ please answer quivk 10 points Morgan hoped to arrive first. The early bird gets the worm. Wherever you go, go early.Birds start feeding early each morning. One reason India is referred to as a subcontinent is because it sits on its own ___________________. how many combinations can be made with 3 coins? Read the newspaper article (below) about a court case and decision or find one in your local newspaper to read. Imagine that the case you have read about was reported to an Inca court of law 500 years ago. Rewrite the news article as if it were tried in court under Inca rule. Describe the offense and what the punishment would be according to Inca law.this is the news paper! PLEASE HELP FAST!!!Courts cracking down on students skipping school -- Excerpt from the Arizona RepublicThe excuses for missing dozens of days of school this year ranged from insomnia to asthma to not liking the "drama" in high-school hallways.But Judge Dan Dodge wasn't having any of it at a new special hearing he holds for truants and their parents once a month."Chronic truancy is a criminal offense. Do you want to start out your life with a criminal record?" Dodge said as he stared down from the bench at Gilbert's Highland Justice Court at a sleepy-eyed 15-year-old Dobson High School student.The freshman said he has missed dozens of days of school this year because he usually struggles to fall asleep until 3 a.m. He then has trouble getting up for his 8 a.m. class. And Mom, typically asleep herself at the hour school starts, is no help, the student said."I don't really care about school," he had said before walking into the courtroom. "I would rather stay up late and play music."Dodge was unsympathetic, saying the problem could easy be solved with fewer late-night jam sessions and a louder morning alarm clock. Or maybe Mom should just pour a glass of water on his head every morning at 6 a.m., the judge said.Dodge told the young insomniac to have no more unexcused absences this year or he could lose his right to apply for an Arizona driver's license until he turns 18.Potential prosecutionOn a recent afternoon, Dodge looked around a courtroom full of accused truants, their parents and their guardians and told everyone to shape up or face prosecution by the Maricopa County Attorney's Office.Parents in the room eyed each other with chagrin as Dodge told them that they, along with their teens, could face Class 3 misdemeanor charges -- meaning fines and possible jail sentences -- if they did not get their kids to school on time or make arrangements for them to study at home because of chronic illnesses."And if you want to drop out and ruin your life at age 16, that is your prerogative. But before that, it is not your privilege," Dodge told the students, who are not identified because The Arizona Republic typically does not print the names of juveniles accused of crimes.Dodge ordered the kids and parents to return to his courtroom in March with report cards and attendance records. If things have improved by then, charges will be dropped. Merging one image with another can be done using which of the following?Croppingo Image scalingO Perspective control0 Layers