1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
2 years ago
13

Daily IT Question

Computers and Technology
2 answers:
lilavasa [31]2 years ago
6 0

Answer:

D

Explanation:

You would not have to make a whole new set of punch cards if you knew the card that had the mistake. Simply remove this card from the pile and make a new punch card in its place.

lara31 [8.8K]2 years ago
5 0

Answer:

D

Explanation:

Businesses would not want to lose a lot of money due to one flaw, so they would find a simple way to fix it.

You might be interested in
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
In your own words! Give me an example of Digital Literacy? (50 words
iVinArrow [24]

Answer: See explanation

Explanation:

Digital literacy is when an individual can compose, find, and evaluate, a clear and composed information on digital platforms.

It involves possessing the skills that one need to live, and learn, through the use of digital platforms such as social media, mobile

Example of digits literacy is the use of search engines, understanding how web browser can be used or sending of emails. etc

3 0
3 years ago
I've been stuck on these two basic javascript assignments for an embarrassingly long time. The teacher refuses to help me and th
user100 [1]

Answer:

it is 29 0ver 30

Explanation:

i took the quiz

5 0
3 years ago
Which term is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed
ludmilkaskok [199]

Answer:

script kiddies

Explanation:

script kiddies is used to describe individuals who want to attack computers yet lack the knowledge of computers and networks needed to do so

8 0
3 years ago
Microsoft sql server, oracle, db2 are examples of:_____.
Sloan [31]

Oracle, DB2, and Microsoft SQL Server are examples of RDBMS. Therefore, the <u>correct option of this question is (c)</u> i.e. RDBMS.

A software used to store, query, and retrieve data stored in a relational database is referred to as a relational database management system (RDBMS). In RDBMS, data is represented in tables with rows and columns.

The RDBMS handles administrative functions such as managing data access, storage and performance. To perform these administrative services, RDBMS provides an interface between the database, applications and users.

Some features of RDBMS are described below:

  1. RDBMSs are more secure, faster and easier to work with.
  2. More than one user can have access to RDBMS at a point of time.
  3. RDBMS supports distributed databases.
  4. RDBMS can store a vast amount of data.
  5. Only the data in the form of tables is managed by RDBMS.
  6. Data redundancy is reduced in RDBMS using primary keys and indexes.

Thus, Oracle, DB2, and Microsoft sql server are example of RDBMS.

<u>While the other ptions (a) supply chain management and (b) erp applications are not correct because:</u>

  • Supply chain management is a centralized management process that handles the flow of goods and services, such as movement and storage of raw materials, inventory, finished goods, and delivery of the final product.
  • Enterprise resource planning (ERP) applications refers to software used in organizations to manage day-to-day business operations such as project management, risk management and compliance, procurement, accounting and supply chain operations.

You can learn more about relational databases at

brainly.com/question/13262352

#SPJ4

7 0
1 year ago
Other questions:
  • Why should spain go to Africa ​
    15·1 answer
  • I need the code for Assignment 5 Animation in Edhesive, its in python code.
    9·1 answer
  • Can y’all help me with these questions ?
    5·1 answer
  • Cyberlaw consists of: a. only state statutes. b. only federal statutes. c. traditional legal principles that have changed becaus
    6·1 answer
  • What are the characteristics of the Global Address List? Check all that apply.
    13·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • What's the main piece of information you look for in an e-mail message you're investigating??
    14·2 answers
  • A _______ template is used to maintain consistency in terms of margins and page numbers .
    6·1 answer
  • What does the revolver do computer science​
    9·1 answer
  • Is anybody willing to gift me V bucks? Gamer tag: SpiffyPlop
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!