1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
2 years ago
11

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

Computers and Technology
1 answer:
MariettaO [177]2 years ago
4 0

Answer:

A computer is the __________ of an attack when it is used to conduct an attack against another computer.

Answer: Subject

Explanation:

You might be interested in
A toolbar of round buttons that appear when you move the mouse when in Slide Show view id called ____________.
ruslelena [56]

Answer:

slide show toolbar is the answer

7 0
2 years ago
How would you define a relational database ?
UNO [17]

Answer: (D) Database design follows the twelve principles proffered by Dr. Edgar F. Codd

Explanation:

 The relational database is basically based on the relational model of the data which is proposed by the Dr Edger F. codd and he mainly introduced the twelve basics principle of the database designing in the database system. He also contributed various valuable principle in the computer science.

The twelve principle are:

  • The first rule of the relational database is the information rule as it represented all data or information
  • Independence of the integrity
  • Viewing various updating rule
  • Logically treatment of various NULL value
  • Independence of the physical database
  • Distribution in-dependency
  • Various delete, insert and update rules
  • The overall logical description of the database are basically stored in the database directory
  • There is no subversion rule
  • There is guarantee accessing rule
  • Proper rule for data language
  • The relational database level actions

7 0
3 years ago
Identify the command on a local desktop CMD that will verify which group policies have been applied to the workstation. SELECT T
fomenos

Answer:

The answer is gpupdate

Explanation:

gpupdate command is used to update Group policies in Windows operating system Domain.

There are different options to use with the gpupdate but one of the most used option is the '/force' which will reapply all policy settings

8 0
3 years ago
State<br> any three (3) reasons why users attach speakers to their computer?
lidiya [134]

Answer:

To complete the computer setup, to hear audio, to share audio.

Explanation:

A computer is not <u>really</u> complete without speakers.

So that you can actually hear the computer's audio.

So that you can have multiple people hear the same audio. (Headphones do not do this)

4 0
3 years ago
Explain why a document created by word processing software is stored as a binary file.​
Savatey [412]

Answer:

Refer below.

Explanation:

Binary DOC records regularly contain more content organizing data (just as contents and fix data) than some other document designs like Rich Text Format and Hypertext Markup Language, however are normally less broadly good.

The DOC documents made with Microsoft Word renditions contrast. Microsoft Word forms before Word 97 ("8.0") utilized an alternate organization from the OLE/CFBF-based Microsoft Word 97 – 2003.

In Microsoft Word 2007 and later, the binary document design was supplanted as the default position by the Office Open XML group, however Microsoft Word can in any case produce DOC records.

3 0
3 years ago
Other questions:
  • Monica needs a printer to use at home. She wants fine-quality prints at an affordable cost. Which printer will help her achieve
    9·1 answer
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • In a clustered column chart, the names of each column are part of the ____ series. select one:
    11·1 answer
  • Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
    8·1 answer
  • Technology not only influences what formats are possible in media, it also defines their contents.
    13·1 answer
  • Which of the following is NOT a valid declaration for a character string?
    8·1 answer
  • What is the main advantage of using DHCP? A. Allows you to manually set IP addresses B. Allows usage of static IP addresses C. L
    8·1 answer
  • Cine stie repede va rog mult si repede
    9·1 answer
  • Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
    9·1 answer
  • What is the address space of a computer with a 64-bit address bus?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!