1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tekilochka [14]
4 years ago
9

A(n) ____ is a request for specific data from a database.

Computers and Technology
1 answer:
kotykmax [81]4 years ago
5 0
A query is a request for specific data from a database.
You might be interested in
What is an inode number? Group of answer choices A number that is associated with the file and unique in that particular filesyt
gregori [183]

An Inode number is a number that is related to the file and unique across all file systems in Linux and Unix.

A number that is associated with the file and unique in that particular filesytem.

<u>Explanation:</u>

Whenever any files are created on the system, It is given a file name with a number (inode)is unique. To access this file on the system, the user usually will use the file name. But here, he or she will have to access the file along with an Inode number associated with it.

Where stored as numbers datatype in a table called the Inode table. The Inode table is created only when the file system is created. It shows how many inodes are filled and how many are free. The command “df-i” shows the inode table in Linux

8 0
3 years ago
A user reports that he cant browse to a specific website on the internet. From his computer, you find that a ping test to the We
ikadub [295]

Answer:

Incorrect DNS server address

Explanation:

7 0
2 years ago
How do you return a value from a function?
rjkz [21]

Answer:

return instruction used to return a value from a function.

Explanation:

Function is a block of statement which perform the special task.

Syntax for define a function:

type name(parameter_1, parameter_2,...)

{

  statement;

return variable;

}

In the syntax, type define the return type of the function. It can be int, float, double and also array as well. Function can return the array as well.

return is the instruction which is used to return the value or can use as a termination of function.

For return the value, we can use variable name which store the value or use direct value.

4 0
3 years ago
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
While doing research for a newspaper article on different career salaries, Lucinda finds a broad range of salaries for nurses wh
anastassius [24]
From the given situation above, the best suggestion that can be given to Lucinda for a better research tool for her article is that, Lucinda should <span>consult .org websites, perhaps one linked with a nurses’ association, or consult a .gov website with national labor statistics on nursing salaries, both of which are more reliable. The correct answer would be the last option, option D.</span>
7 0
4 years ago
Other questions:
  • Write a program to prepare the monthly charge account statement for a customer of CS CARD International, a credit card company.
    11·1 answer
  • Where can you find additional commands to include in menu options?
    12·1 answer
  • Which best describes IMEI?
    7·1 answer
  • Write a program that reads the contents of the two files into two separate lists. The user should be able to enter a boy’s name,
    6·1 answer
  • What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?
    10·1 answer
  • A user who enters americanbank.net into a web browser instead of the correct americanbank and is then taken to a fake look-alike
    11·2 answers
  • What social media profession entails determining how and in what way an organization will create and maintain a social media pre
    7·1 answer
  • Create class SavingsAccount. Use a static variable annualInterestRate to store the annual interest rate for all account holders.
    11·1 answer
  • A _is a short descriptive label that you assign to webpages, photos,
    10·1 answer
  • Changing how information is represented so that it can be read by a person is called
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!