1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
8

Select all actions that a database may perform

Computers and Technology
1 answer:
siniylev [52]3 years ago
4 0
3 create a data form 
5 validate the data...

You might be interested in
Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are
aliina [53]

Answer and Explanation:

Ben needs to cite his source of information when including information from the Web in his academic paper. A common citation method that he could use to cite his source is APA style.

When citing a website using APA style of references, you need to include the author, the title of the page or article, the date of publication, , the website name, and the URL(ususally in brackets).

4 0
2 years ago
Interruption attacks are also called ___ attacks:
Lelu [443]

Answer:

Interruption attack are also referred to as Denial Of Service(DOS) attack.

Explanation:

Interruption attack are also called denial of service.The main aim of  interruption attack or Denial Of Srvice attack is to make resources unavailable.

For example:- wordpress.com had an DOS attack that took down their servers hence the service was unavailable for it's users.

Hence we conclude that the answer to this question is Denail of Service (DOS).

4 0
3 years ago
Please help. will give u brainliest!! khan academy computers and the internet!!
Oxana [17]

Answer:

a or c

Explanation:

think of which answer seems illogical.

5 0
3 years ago
What is the name of the variable in this code?
nata0808 [166]

Answer:

fav_color

Explanation:

4 0
2 years ago
Read 2 more answers
The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
Virty [35]
I think it is Defragment
8 0
3 years ago
Read 2 more answers
Other questions:
  • If a gas gosts 3.60 per gallon how much doe sit cost to drive 500 miles in the city
    5·1 answer
  • Are we too dependent on technology if yes then can you please explain?
    12·2 answers
  • Plz answer and dont put a random thing for the points
    11·1 answer
  • Which osi layer is responsible for combining bits into bytes and bytes into frames?
    8·1 answer
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • What is a feature of Print Preview? Fit to Document Fit to Margin Fit to Page Fit to Size
    5·2 answers
  • Combining two or more cells to make one is called​
    8·1 answer
  • Explain the emerging trends in microcomputer technology in relation to size​
    11·1 answer
  • Can someone send me reference on communication, importance , communication cycle , pros and cos​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!