Answer:
According to the information presented in this video, a spreadsheet is effective for managing information about one thing (e.g., items for sale), but a
C. database
is better for managing information about more than one thing (e.g., items for sale and suppliers of items).
Explanation:
- The option A is not correct as the flowchart is a step-by-step explanation of a procedure. It is visual presentation in which we explain a whole process.
- The option B is not correct as network is defined as the group of different computers, servers and other machines that helps the exchange of data.
- The option c is correct as database is the means of storage of data as well as we can access this data at any time and it let you manage the data as well so we can manage a lot of information about multiple things at a time.
- The option d is also incorrect as workflow is the visual presentation of sequence in which tasks are performed so it doesn't have to do anything wit the managing the information.
- The option e is also incorrect as data model defines the properties of data of different things and it is used in database. It sets the rule of storing, managing and accessing the data in a database.
Bluetooth on a laptop is often used to help pair a mobile device with another device for communication purposes.
<u>Explanation:</u>
A Bluetooth gadget works by utilizing radio waves rather than wires or links to associate with your mobile phone, cell phone or PC. Bluetooth is a remote innovation standard utilized for trading information among fixed and cell phones over short separations utilizing short-wavelength UHF radio waves in the modern, logical and restorative radio groups, from 2.400 to 2.485 GHz, and building individual zone systems. For instance, on Windows, either right-click the Bluetooth symbol in the notice zone or go to the Control Panel to discover the Hardware and Sound > Devices and Printers page. At the point when the gadget shows up in the rundown of Bluetooth and different gadgets, select it to associate (pair) it to the workstation.
Answer:
I dont know anything abt that
Explanation:
Answer: Session Hijacking
Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.
Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.
Answer:
Transaction Manger
Explanation:
Transaction Manger
Transaction Manager is responsible for transaction between resources that are available. It works as interface to support remote access form other systems in Data base management system.