The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The company wants to a?

Answers

Answer 1

Answer:

Explanation:

B is correct


Related Questions

Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her _____ memory.

Answers

Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic  memory.

What is memory?


This is the term that is used to refer to the human ability to store the things that they hear and the things that they see to mind. It is the ability that people have to recollect things that they have seen happen.

The echoic memory is the term that is used to refer to the short term memory that has the ability to store the things that a person would hear. This type of memory may only last for a short while.

Hence we can say that Charlene may be able to repeat the last few words that someone spoke even if she was not paying attention. this is because the information is still available in her echoic  memory.

Read more on echoic  memory here: https://brainly.com/question/10196869

#SPJ1

WHO LIKES Blading in real life

Answers

Answer:

everyone

Explanation:

________ focus on managing documents, communicating, and scheduling. group of answer choices transaction processing systems knowledge work systems executive support systems office automation systems.

Answers

Office automation systems focus on managing documents, communicating, and scheduling. The correct option is D.

What is an Office automation system?

An office automation system is a tool from which data can be transferred from one system to another system without using manpower, or without human interventions. Examples are slack, Zoom video calls, Microsoft video calls, etc.

They are used to analyze, collect, and share data. They manage tasks easily, they also manage business process management software.

Thus, the correct option is D. office automation systems.

To learn more about the Office automation system, refer to the below link:

https://brainly.com/question/15131330

#SPJ1

Why is the middle portion of 3des a decryption rather than an encryption?

Answers

Answer:

There is no cryptographic significance to the use of decryption for the second stage. Its only advantage is that it allows users of 3DES to decrypt data encrypted by users of the older single DES by repeating the key.

After thoroughly evaluating a supplier, many organizations summarize evaluations using a supplier ____ matrix-a type of weighted scoring model.

Answers

After thoroughly evaluating a supplier, many organizations summarize evaluations using a supplier evaluation matrix-a type of weighted scoring model.

What is evaluation matrix?

This is a tool, used to measure proposals, submitted by suppliers. It is basically meant to rank proposals based on defined criteria so that the best can be chosen.

In evaluation matrix, a score is assigned to each criteria that was considered under different categories and then the supplier with the highest score is selected to do business with.

Using evaluation matrix assess the suitability of suppliers to the business, who can work with the business for a long time hence, an essential tool for planning and organizing an evaluation.

Learn more about evaluation matrix here: https://brainly.com/question/15071654

#SPJ1

A machine where the operating system runs an application on top of an operating system is called?

Answers

A machine where the operating system runs an application on top of an operating system is called a virtual machine.

What is a virtual machine?

A Virtual Machine (VM) is known to be a kind of a tool that is known to often help one to be able to compute resource that make use of software to run programs and carry out apps.

An operating system (OS) is said to be the program that, is known to be one that is being first loaded into the computer as a result of a boot program, and it is one that handles all of the other application programs inside any computer.

Hence, A machine where the operating system runs an application on top of an operating system is called a virtual machine.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ1

Write a program that takes a string as an input. If the string entered is equal to
“Chicken”, print “This is equal” to the screen. If the string entered is not equal to
“Chicken”, print “This is not equal” to the screen.

Answers

The program could be written using a python script.

Python script on string operation

The program takes a string as an input. First, declare a variable for the input:

var = str()

#The above code will ask for a string to be inputted

Next would be to condition the script in a particular direction using the 'if' statement. That is, a Boolean function.

if var ==('chicken'):

#The above code will compare the inputted string to the word 'chicken'.

  print("This is equal")

#The screen will display 'This is equal' if the inputted stringis the same as 'chicken'.

else:

  print("This is not equal")

#The screen will display "This is not equal" if the inputted string is not the same as 'chicken'.

In summary, the code goes thus:

var = str()

if var ==('chicken'):

   print("This is equal")

else:

   print("This is not equal")

More on python scripts can be found here: https://brainly.com/question/14378173

#SPJ1

Brendan is examining a report using the design view. which section in the design view is going to appear only once on the first page and could contain logos and title information? page header page footer report header report footer

Answers

Answer:

report header

Explanation:

,,,,,,,,,,,

When a database stores view data, it uses a _____ that depends on data in a corresponding _____.

Answers

When a database stores view data, it uses a materialized view that depends on data in a corresponding view table. The correct option is 4.

What is a database?

A database is a collection of data in an organized and easy way. They store electronic data and manipulate it. An example is an online telephone directory that saves people's contact, name, and addresses.

The materialized view is an organized view of data in the system, and the view table is the table where all the data can be viewed.

Thus, the correct option is 4. Materialized view, view table.

To learn more about the database, refer to the below link:

https://brainly.com/question/25198459

#SPJ1

The question is incomplete. Your most probably complete question is given below:

1. base table, view table

2. materialized view, base table

3. view table, materialized view

4. materialized view, view table

list the different services provided by computer network​

Answers

Answer:

access to the World Wide Web, digital video, digital audio, shared use of application and storage servers

What major difference is likely to exist between on-premises identity services and those used in a cloud-hosted environment

Answers

The major difference between on-premises identity services and those used in a cloud-hosted environment is to deliver account and/or identity management.

What are cloud services?

In computers, a cloud service can be defined as a type of help in which the company may deliver a service on the internet such as, data storage.

Important companies that provide cloud services over the Internet  (e.g., Amazon Web Services) may handle essential information such as account and/or identity management.

In conclusion, the major difference between on-premises identity services and those used in a cloud-hosted environment is that cloud services can deliver account and/or identity management.

Learn more about cloud computing services here:

https://brainly.com/question/19057393

#SPJ1

A field value is currently not in any group. what happens when you try adding it to an existing group?

Answers

When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

What is a  field value?

The value of a field  can be described as the  string of bytes,  which do contains  all bytes in the field after the first colon.

The field value function is is useful in a case whereby extraction of the field data from linked data types is needed.

It is a good method thst used when writing formulas that refer to data types, and that is why the field value do help the user when creating a conditional calculations using a linked data types.

It also gives the enablement in the extraction of the exact values from the cell linked to data types.

It should be noted that this field value is  concatenation of all the lines  found in the the field, outside the  starting name and colon, hence When a  field value is currently not in any group,  What happens when you try adding it to an existing group is that It is removed from the "all" list, and placed under its new group.

Find out more on field value at https://brainly.com/question/843074

#SPJ1

Your workbook has one data source and two worksheets visualizing it. What will be included if you save it as a packaged workbook

Answers

If your workbook is made up of one data source and two spreadsheets, what you would have to add to it would be  Both visualizations and underlying data.

What is data visualization?

This is the term that is used to refer to all of the means by which the data is visualized or made to create meaning to the people that would view it through the use of statistical tools such as graphs, pie charts and other types of visualization.

What the packaged workbook is the local file data that is made up of images that are used in the work book. Hence we say that If your workbook is made up of one data source and two spreadsheets, what you would have to add to it would be  Both visualizations and underlying data.

Read more on workbook here: https://brainly.com/question/27960083

#SPJ1

A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a single target.

Answers

Answer:

ddos

Explanation:

DDOS (Distributed Denial Of Service) is more effective becaause it utilizes many computer systems for the attack, mostly botnets.

Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs

Answers

The type of typeface that Derek should use is option D: humanist sans.

What is an typeface?

A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.

What defines a humanist font?

The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often  include forms that looks like the stroke of a pen.

Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.

Learn more about typeface from

https://brainly.com/question/11216613

#SPJ1

A string consisting of the letters a, b, c and d is given. the string can be transformed either by removing a letter a together with an adjacent letter b or by removing a letter c together with an adjacent letter d. write a function so that the given string s consisting of n characters returns any string

Answers

Using the knowledge in computational language in C++ it is possible to write a code that write a function so that the given string s consisting of n characters returns any string

Writting in C++ code:

#include <iostream>

#include <string>

using namespace std;

string solution(string &s)

{

//length of string

int n=s.size();

//index of string

int i=0;

while(i<n-1)

{

if(s[i]=='A')

{

if(s[i+1]=='B')

{

s=s.substr(0,i) + s.substr(i+2); i=0;

}

else

i++;

}

else if(s[i]=='B')

{

if(s[i+1]=='A')

{

s=s.substr(0,i) + s.substr(i+2); i=0;

}

else

i++;

}

else if(s[i]=='C')

{

if(s[i+1]=='D')

{

s=s.substr(0,i) + s.substr(i+2);

i=0;

}

else

i++;

}

else if(s[i]=='D')

{

if(s[i+1]=='C')

{

s=s.substr(0,i) + s.substr(i+2);

i=0;

} else

i++;

}

n=s.size();

}

return s;

}

int main() {

//Input string

string s="ACBDACBD";

solution(s);

//final output;

if(s=="")

cout<<"Empty String";

else

cout<<s;

return 0;

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

An administrator at ursa major solar is using sharing rules to grant record access to users. which two types of record access can the administrator grant?

Answers

Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

What is read write access?

This is seen as a kind of device that can both act as a kind of input and output or moves and receive.

The read-only access in computing is known to be the permission that is given to a user to be able to access files or directories and it is one where the user is only given the right to read or view, and not to make any changes.

Note that it is also seen as digital file that can be updated and deleted and therefore, Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

Learn more about record access from
https://brainly.com/question/8798580

#SPJ1

Placing a(n)____ to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

Answers

Placing shortcut  to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

What are shortcuts on the desktop?

The shortcuts on the desktop serves as the tolls that help in the location of files as well as other documents and function on the desktop which help in time management when working on the computer.

It should be noted that Placing shortcut  to a folder on a start menu or on the desktop can make it easier to locate and open the folder.

Learn more about desktop on:

https://brainly.com/question/24735155

#SPJ1

What are the three forms of the communication capabilities of digitally enabled technologies?

Answers

The  three forms of the communication capabilities of digitally enabled technologies are:

Consumer-to-consumer cha t roomsInstant messagingSocial networking Web sites.

What is best notion of communication?

The Definition of the term communication is known ton be an act through which or by which information is known to be exchanged between people via a new or very used system of symbols, signs, or others.

Note that the term is known also as the exchange of information and it is one where there is rapport  or lack of communication.

Hence, based on the aabove, The  three forms of the communication capabilities of digitally enabled technologies are:

Consumer-to-consumer cha t roomsInstant messagingSocial networking Web sites.

Learn more about communication from

https://brainly.com/question/26152499

#SPJ1

The total possible load a stream can transport is its______, whereas a stream's ability to move particles of specific size is its _______.

Answers

The total possible load a stream can transport is its Capacity, whereas a stream's ability to move particles of specific size is its competence .

What is a stream's bed load?

The bed load is known to be an aspect or a part of a stream's load that is known to be a lot larger in nature and it is to be carried in suspension.

Note that Capacity is said to be directly associated to a stream's discharge. and that of Deposition. But if  it slows down, the stream/river is one that will not be able to carry large particles anymore, so they lower to the ground.

Hence, based on the above, The total possible load a stream can transport is its Capacity, whereas a stream's ability to move particles of specific size is its competence .

Learn more about competence from

https://brainly.com/question/26437783

#SPJ1

The types of ____ systems used with personal and business computers today include smart cards.

Answers

Answer:

Storage.

Explanation:

I ran into this question before

Answer:

Storage

Explanation:

I've seen this question in a quiz before.

Question 5 of 10
What happens when you create a variable in a video game program?
OA. You hold a spot in the computer's memory for a piece of data that
it will need later.
OB. You save a copy to your computer that you will be able to return to
later.
OC. You change the parameters of the program so the game will look
different.
OD. You create a new event that will run as soon as the game's
program starts.
SUBMIT

Answers

Answer:A

Explanation:just got it right

When you create a variable in a video game program you may hold a spot in the computer's memory for a piece of data that it will need later. Thus, the correct option for this question is A.

What is meant by variable in programs?

In programming, a variable is a value that can be modified or altered with respect to the conditions or the nature and type of information that have to be passed onto the program.

According to the context of this question, a variable has multiple functions in the sequence of programming. These variables are utilized in order to store information that has to be referenced and manipulated within a computer program. Another function of variable is that they also provide a way of labeling the components of programming.

Therefore, you may hold a spot in the computer's memory for a piece of data that it will need later is the action of a variable that you create in a video game program. Thus, the correct option for this question is A.

To learn more about Variable in programming, refer to the link:

https://brainly.com/question/9238988

#SPJ2

in which year computer was invented

Answers

The first computer was invented by Charles Babbage, in 1822, but was not built until 1991

Which type of supplier is hired to provide products or services directly to a lead firm?
a) tier-1.
b) tier-2.
c) subcontractors.
d) networks.

Answers

Option 1. The tier one supplier is the one that is hired to provide products or services directly to a lead firm.

Who is a supplier?

This is the term that is used to refer to the producers that have to make the goods and the services available before they send it to the retailers who then make it available for the people that are going to consume the product that is in question.

The tier one supplier can be referred to as those supplies that one would have to have a direct business dealing with to contracted firms and other production partners that help in the distribution of products.

Hence we can say that the  tier one supplier is the one that is hired to provide products or services directly to a lead firm.

Read more on supplier here: https://brainly.com/question/26500183

#SPJ1

The coalesce function provides one way to substitute constant values for _________________ values.

Answers

The coalesce function provides one way to substitute constant values for null values.

What is a coalesce function?

Is a function that returns the first non-NULL value from a series of expressions. The expressions are evaluated in the order in which they are specified, and the result of the function is the first value that is not null. The result of the COALESCE function returns NULL only if all the arguments are null.

Data type determination of the resulting expression is different. ISNULL uses the data type of the first parameter, COALESCE follows the CASE expression rules and returns the data type of value with the highest precedence.

See more about coalesce function at brainly.com/question/14970953

#SPJ1

Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.

Answers

MMS, or Multimedia Messaging Service, as opposed to SMS.

9. The _______________ component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.

Answers

Answer:

The map/reduce program component of the Hadoop environment is composed of a Procedure that performs filtering and sorting and a method that performs a summary operation.

what might be the greatest risk to any computer installation?
a. fire b.sabotage c. fraud d.theft​

Answers

Answer: a. Fire

Explanation:

The greatest threat to any computer installation would most likely be a fire. Setting up/installing your computer can be a complicated process where fires can be started if you have power running when it shouldn't.

Sabotage might be the greatest risk to any computer installation. The correct option is B.

Thus, Intentional harm or disruption of computer systems, networks, or data by people with malicious purpose is referred to as sabotage.

It may involve intentional alteration of data to harm or disrupt, the introduction of viruses or malware, unlawful access to private information, or hacking.

Sabotage poses a substantial risk to computer installations and the businesses that depend on them because it can result in lengthy downtime, the loss of crucial data, monetary losses, and weakened cybersecurity.

Thus, Sabotage might be the greatest risk to any computer installation. The correct option is B.

Learn more about Sabotage, refer to the link:

https://brainly.com/question/34707842

#SPJ7

What are the different types of topology?​ in details

Answers

Answer:

NETWORK TOPOLOGY .

This tefers to how nodes are connected to the network.

Types of topology.

Physical topology.Logical topology.

In physical topology,nodes are connected physically using wires(cables).

Types of physical topology include:

Bus topologyTree topologyHybrid topologyStar topologyRing topology.

Hope it helps you,any question so far...comment !!!

[tex]\huge\mathcal{♨ANSWER♥}[/tex]

Geometric representation of how the computers are connected to each other is known as topology. There are five types of topology.

They are,

Bus topologyRing topologyStar topologyMesh topologyTree topology

♻Bus topology

Bus topology, also known as line topology, is a type of network topology in which all devices in the network are connected by one central RJ-45 network cable or coaxial cable. The single cable, where all data is transmitted between devices, is referred to as the bus, backbone, or trunk.

♻Ring topology

Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring.

♻Star topology

Star topology is an implementation of a spoke–hub distribution paradigm in computer networks. In a star network, every host is connected to a central hub. In its simplest form, one central hub acts as a conduit to transmit messages. The star topology is one of the most common computer network topologies.

♻Mesh topology

A mesh topology is a network setup where each computer and network device is interconnected with one another. This topology setup allows for most transmissions to be distributed even if one of the connections goes down. It is a topology commonly used for wireless networks.

♻Tree topology

A tree topology is a special type of structure where many connected elements are arranged like the branches of a tree. For example, tree topologies are frequently used to organize the computers in a corporate network, or the information in a database.

...hope this helps...

_♡_mashi_♡_

how drone technology can impact recreation and entertainment​

Answers

Drones are become more advanced than ever before. Are now, they are starting to impact recreation. They are small, light, and can maneuver incredibly fast. They are being used in movies, skits, short films, and even high-end videos. Here are some ways drones are changing entertainment:

- Providing high-quality filming, even from 200 feet in the air.

- Reaching spaces where bulky helicopters cannot fit into safely

- Laser shows, where drones shine lights and lasers.

Right now, if you tried to hold your phone still to capture a video, you would not be able to do it. Upon checking the footage, you would see the camera shaking, even if it's just tiny bit. While you can lean it on a surface to fix this, it simply cannot be done in the air to capture. Not to worry, though, you've got drones. They can shoot a steady shot 200 feet in the air. The only thing that could rival drones are expensive, bulky choppers. The drones are cheaper and are mass produced.

However, drones are not only being used to filming movies and films. They are also being used for a different kind of entertainment: Shows. Drones move in formation and shine lights in the night sky, like we saw in the Winter Olympics. They are truly stunning(pics attached).

Other Questions
A stationary observer observes a spaceship fly-by. As the spaceship's velocity gets closer to the speed of light, the stationary observer: What is the proposition that the link between attitudes and behaviors is stronger when the attitude and the behavior are measured at the same level of detail? A nursing assistant is working with a delegator. which action of the nursing assistant may negatively affect client care management? Piaget believed that peers serve an important role in teaching children how to function effectively with others because these relationships are? Eric has blue eyes. Because the gene for blue eyes is recessive. What must be true of eric regarding this trait? For countries participating in a regional trading agreement, what makes this type of agreement significant to the countries involved? Is "hzsela" a proper word in Spanish? The spelling seems weird. I was tasked to write "(you informal) make it for her" as an affirmative tu command in Spanish using double object pronouns. Is "hzsela" correct? I need help with the questions in this photo ___________ is a powerful______________employed at the beginning and ending of many hindu ceremonies and rituals. it is also written with honey on newborns lips or tongue during a birth ceremony. If the true owner does not come forward and the finder does not wish to claim ownership, title to the property transfers to the state _________ HELP!!!!!!! Which other sport or activity, aside from running or shooting a basketball, would you like to analyze using biomechanics? Choose at least one sport. What movements of the body would be important in the analysis? What steps are involved? Explain. Why is it important for the person with power of attorney to be a strong communicator?A) it helps them understand end-of-life law better.B) it helps them make sure their own wishes are carried out.C) it helps them make a strong case for the patient.D) it helps them prove they are qualified for the role. What is the name of the irreversible inhibitor (drug) used as an example in the lecture? Rabbits are known for being extremely prolifichaving a high reproductive rate. The average gestation period for rabbits is about 28 days and they have an unusual reproductive system that permits a female rabbit to be pregnant with two litters at once. This is an adaptation that allows rabbits to survive in the wild where they have a high mortality ratetheyre a source of food for many species of predators! In situations where there are no natural predators, two adult rabbits could easily become 1000 in one years time. i. Using this information, construct an exponential model to predict the number of rabbits after x years if there are no natural predators. ii. If the rabbit population were left unchecked (no predators and an abundance of food), how many rabbits would there be at the end of 3 years? which is the ideal ratio that structure should have with respect to the total space in the photograph?A structure should have theratio with respect to the total space. How many moles are in 25.3 grams of SO 3?A.3.16B.0.316C.2 020D.105 Andy warhol used commercial processes to create many of his works because ________. A person will be less likely to fall prey to the Asch effect if there is at least one other dissenter in the group, if the group is small, or if responses are made in _______ a. after hearing everyone elses responses b. Public c sequence d private Ivan suggests they name the kitten the names of players on the Lion's baseball team because "she's a little lion." Infer the significance of this statement. In the story, the faithful servant is the protagonist and the king is the antagonist. Why do you think these two characters fit the classification of protagonist and antagonist? Write your answer in 75 to 100 words.