1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
6

The database structure in a dbms is stored as a _____.

Computers and Technology
1 answer:
Colt1911 [192]3 years ago
6 0
This will be stored as a collection of files
You might be interested in
Star and peer-to-peer are types of
Naily [24]
Networks? i’m not sure, but i know peer-to-peer is a type of network. i’m not sure about lending though
3 0
2 years ago
Read 2 more answers
Cmo se puede añadir amigo ??'
seropon [69]

Answer:ok

Explanation:

5 0
3 years ago
You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c
sergejj [24]

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

4 0
3 years ago
Definition of laptop
zaharov [31]
A device that sucks bc mien broke
7 0
3 years ago
Read 2 more answers
What does the abbreviation gps mean?
MissTica
GPS stands for Global Positioning System
5 0
3 years ago
Read 2 more answers
Other questions:
  • Create a public non-final class named Streamer. You should implement one class method: filterStrings. It should accept a single
    8·1 answer
  • Where is authorization management app on tablet?
    7·1 answer
  • A county collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a h
    13·1 answer
  • In Word, blue underlining indicates which of these problems?
    12·1 answer
  • What is it called when two different files generate the same hashing result?
    15·1 answer
  • Edhesive 2.3 code practice question 1​
    11·1 answer
  • Explain the working principal of computer system with suitable diagarm​
    10·2 answers
  • What is data intergrity​
    13·1 answer
  • The first person to say something in here will get brainliested.
    7·2 answers
  • Help me with this two questions please
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!