1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
8

. SQL is a(n) _____ language.

Computers and Technology
1 answer:
Blababa [14]3 years ago
7 0

Answer: Fourth- generation language

Explanation:Structured Query Language (SQL) is the language that is in the form of database structure which helps in the manipulation of the data and management as well.

SQL is considered as the fourth generation language because it is used for the accessing of the data from the database.It is also known for the advancement in the third generation language and thus also improving the language interface with users.

You might be interested in
A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
Delicious77 [7]

Answer: True

Explanation:

 Yes, the given statement is true, as the bastion host basically require two individual firewall that connect with the internal network and perimeter network by using the perimeter configuration.

Perimeter network basically isolate the the bastion host from the internal network. Bastion host is the serve as the host that connect with the external world. As, perimeter network is one of the type of the firewall network system.

Therefore, the internal network and the perimeter network basically connect with the firewall by using bastion host.

3 0
3 years ago
What are some of the ways you can use bitlocker encryption? (choose all that apply?
nasty-shy [4]
Bitlocker Encryption can be used during the process of authenticating your computer with a TPM, during the process of authenticating your account with a USB flash drive, and most of the authentication through text messages.
3 0
3 years ago
What do you think that private information like passwords pin number will be guarded or shared with the public? why?
konstantin123 [22]

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

<h3>Why should you use passwords to protect private information?</h3>

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

brainly.com/question/17174600

#SPJ1

4 0
1 year ago
How we can earn from an app​
miss Akunina [59]

Answer:

Hewo, Here are some ways in which apps earn money :-

  • Advertisement
  • Subscriptions
  • In-App purchases
  • Merchandise
  • Physical purchases
  • Sponsorship

hope it helps!

5 0
3 years ago
What is the first step in the exchange between a web browser and a database?
bezimeni [28]
<span>The client browser requests a page from a Web server.</span>
3 0
3 years ago
Other questions:
  • A windows computer is shared between several users, each with his own local user account. Each user has his own dedicated, uniqu
    9·1 answer
  • Recording music using a keyboard controller is commonly accomplished using which type of audio file format?
    13·1 answer
  • An advertiser who sells coffee beans adds the keyword “Java'” to an ad group. After two weeks, she runs a placement performance
    8·1 answer
  • How does this app work?
    11·2 answers
  • Write a program that does the following:
    11·1 answer
  • How can I make a website login system with only using php?​
    6·1 answer
  • Based on a Supreme Court ruling, an Internet-based merchant needs to charge sales tax only when _____.
    9·1 answer
  • Similarites between hardware and software
    9·1 answer
  • Consider the following code.
    7·2 answers
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!