1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
1 year ago
3

________ software allows the user to enter, organize, and store huge amounts of data and information.

Computers and Technology
1 answer:
Anna [14]1 year ago
6 0

<u>Database management </u>software allows the user to enter, organize, and store huge amounts of data and information.

<h3>What are databases management?</h3>

Database Management is known  to be a term that connote that which gives room for a person to be able to organize, save, as well as retrieve data from a computer.

Note that Database Management can also tell more about  the data storage, operations, as well as  security practices of a database administrator (DBA) in all of the life cycle of the data.

Therefore, <u>Database management </u>software allows the user to enter, organize, and store huge amounts of data and information.

Learn more about Database management  from

brainly.com/question/24027204
#SPJ1

You might be interested in
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Advertising managers work on websites used in __________?
Elena-2011 [213]
Campaigns

Hope this is right :-;
3 0
3 years ago
Read 2 more answers
PLEASE HELP!!!!!!!!!!!! IT'S VERY URGENT!!!!!!!!! Social Networks websites put the responsibility for intellectual property?
Tasya [4]
I think all the answers you picked were correct except the last one I think is B because even though the disc is copyrighted it's not considered intellectual property
7 0
3 years ago
Read 2 more answers
Use the paragraph underneath to answer the four questions.
Xelga [282]
Wow...that’s a long paragraph
8 0
3 years ago
BI U
elena-s [515]

Answer:

This should be done in a PowerPoint presentation and word processor like MS PowerPoint and MS Word (if I understood your question correctly)

6 0
3 years ago
Other questions:
  • Edhesive silly questionsj
    8·1 answer
  • 11. The golden rule of safe driving is: A. Always drive at the posted speed limit B. Never drive while physically or mentally im
    15·1 answer
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • Write a repetition statement that outputs the numbers 45 , 51 , . . . , 165 . That is, all of the multiples of 6 in increasing o
    7·1 answer
  • You should structure the first before you search for a relevant picture.
    8·1 answer
  • The _____________ RTN describes the overall effectof instructions on the programmer visible registers
    9·1 answer
  • A customer seeks to buy a new computer for a private use at home.The customer primarily needs the computer to use the Microsoft
    8·1 answer
  • Please help me to solve this fast please <br>​
    5·1 answer
  • The school has determined that finding the absolute best schedule cannot be solved in a reasonable time. Instead they have decid
    8·1 answer
  • Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produc
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!