1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s2008m [1.1K]
3 years ago
5

Odbc works on the ____ operating system.

Computers and Technology
1 answer:
kvv77 [185]3 years ago
4 0
The correct answer would be Windows.

You might be interested in
In the event of a network attack or intrusion, a _____ lists the tasks that must be performed by the organization to restore dam
dexar [7]

Answer:

The answer is "Recovery Plan for Disasters".

Explanation:

In the given statement, some of the information is missing, which can be described as follows:

A) systems engineering plan

B) security compliance plan

C) risk assessment plan

D) Recovery Plan for Disasters

It is a set of guidelines for the execution of a recovery process, it provides the restoration and safety to the system for the organization in the event of a disaster. It defined as "a detailed summary of the appropriate acts to be carried out before, during and after a disaster", and incorrect choices were explained as follows:

  • In option A, It is used to design and analyze complex systems.
  • In option B, It provides frameworks for the corporate evaluation process.
  • In option C, It is used to identify the problems.
6 0
3 years ago
Which of the following are downlink transport channels?
Hunter-Best [27]
I think it’s a or b
4 0
3 years ago
What is the output of 1101×10==11000+10
aliya0001 [1]

Answer:

west ward cpt output

Explanation:

i know because i invented it

6 0
3 years ago
What was the original name of the Dream SMP?
Naddik [55]

Answer:

Dream Team SMP

Explanation:

7 0
1 year ago
Read 2 more answers
3. What role can the school play in order to avoid and act against cyber bullying?​
Snowcat [4.5K]

Answer:

below

Explanation:

really nothing because you cant prevent cyberbullying in any way its going to happen at anytime anywhere you can act against it by doing a orginazation to try and prevent it.

6 0
3 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • If two cars got to a four way stop intersection at the same time which car should be yield the right-of- way
    12·1 answer
  • In some cases, certain Hyper-V guest operating system features do not function properly using the operating system's own device
    9·1 answer
  • A powerful computer that acts as a hub for other computers is a called a ______.
    6·2 answers
  • To reduce costs and the environmental impact of commuting, your company decides to close a number of offices and to provide supp
    14·1 answer
  • When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
    10·1 answer
  • In computer science how can you define "copyright, designs and patents act 1988"?​
    8·1 answer
  • Explain the difference between overexposed vs. underexposed images?
    15·2 answers
  • Primary storage is electronic storage connected directly to the CPU. true or false​
    9·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!