1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
2 years ago
10

What is the difference between organizing your data in a list and organizing it in a data extension?

Computers and Technology
1 answer:
azamat2 years ago
7 0

The difference between organizing your data in a list and organizing it in a data extension is that in a list, you organize subscribers by name. In a data extension, you organize them by region.

<h3>What is Data extension?</h3>
  • A data extension contains contact information. A data extension is just a table with fields for contact information.
  • Data extensions can work independently or in conjunction with other data extensions.
  • The data may be used for searches, information retrieval, and sending to a selection of subscribers.
  • You have two options for importing data extensions: manually or automatically using Automation Studio or the Marketing Cloud API.
  • Both Contact Builder and Email Studio allow the usage of data extensions, but Email Studio is the only place where sharing, permissions, and other features are available.

To learn more about data extension, refer to the following link:

brainly.com/question/20388719

#SPJ4

You might be interested in
NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
WITCHER [35]

Answer:

The answer is "Option a".

Explanation:

In cloud computing, it is also known as the model, that enables you for accessible, convenient, through the-demand network access to global computer resources, which can be rapid to get and published via low administrative effort.  

Its recommending selection for the cloud providers support for the robust encryption, that has adequate replication processes in place, use user authentication, or provide ample clarity to customers regarding mechanisms that defend subscriptions against other subscriptions and the supplier.

8 0
3 years ago
All organizations with a router at the boundary between the organization’s internal networks and the external service provider w
Anika [276]

Answer:

False

Explanation:

Access Control Lists (ACLs) are network filters used by routers and some switches to permit and restrict data flows in and out of network devices. When an ACL is implemented in a device or interface, the network device analyses data passing through it, compares it to the specification described in the ACL, and allows it the data to flow or prohibits it. One of the main reasons ACLs arre used is to provide a basic level of security for networks. If anything, the use of ACLs and their complexities bring about a delay in transmission through networks.

3 0
3 years ago
here are pros and cons for doing temp work. Please select the best answer from the choices provided T F
Brut [27]

Answer:

Hello! the answer should be true, I hope i got here in time.  

Explanation:

6 0
3 years ago
Read 2 more answers
A a a a I don't need help!?
Arlecino [84]

Answer:

ok

Explanation:

ok

6 0
2 years ago
A network administrator is implementing multifactor authentication for employees who travel and use company devices remotely by
devlian [24]

Answer:

A networking administrator is a multi-factor authentication for employees who use company devices by using a VPN. The level of authentication is 802.1X and OTP.

Explanation:

Network administration is the computer network and uses multiple computers. A company and organization uses multiple computers and need a network admin to connect with a different system. Network administrators depend upon the organization. Some duties of the network administration are split and clearly defined such as

Configure the network hardware, servers, and routers

Upgrade the computer networks

Troubleshooting network issues

Assigning the network models

Deploying the software

Managing the servers

Implementing the security and measure

Network administration requires technical competence and will benefit as a network administrator.

For the level of authentication 802.1, X and OTP are suitable for network administration.

5 0
3 years ago
Other questions:
  • What is the fundamental problem producers and consumers face?
    12·1 answer
  • The ________________ command tests connectivity by sending an echo request to a remote computer.
    14·1 answer
  • What the repeal of online privacy protections means for you?
    8·1 answer
  • Blank are back and forth movement of matter that create sound​
    15·1 answer
  • Which activity does not allow a person to perform any work while at the shop
    10·1 answer
  • How can you have a safe browser experience
    9·1 answer
  • Identify the following as True or False.
    14·1 answer
  • 2.7 code practice question 1 edhesive
    13·2 answers
  • Difference between a software package and Integrated software and why users would choose one over the other
    8·1 answer
  • Create the code that will find
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!