1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
3 years ago
8

What are the meaning master files​

Computers and Technology
1 answer:
Ronch [10]3 years ago
7 0

Answer:

A collection of records pertaining to one of the main subjects of an information system, such as customers, employees, products and vendors.

Explanation:

You might be interested in
How can this requirement be met? Universal Containers provide access to Salesforce for their Sales, Service and Marketing Teams.
ArbitrLikvidat [17]
Good luck and I hope u can find the right answer
5 0
3 years ago
What does the metric column in a routing table do?
Verdich [7]

Answer:

 The metric column basically indicate the cost of the route in the routing table and also decide correct route in the routing table.

In the routing table, the lowest metric route is more preferable route as compared to others. In the networking, the routing table is basically used to store the data or information in the form of table in the router.

In the computer network, the routes are listed for the particular destination in which the routes are basically associate that particular routes.

4 0
3 years ago
How can you tell that someone is listening to what you through your device ?
Alika [10]

Answer:here are some signs to look out for: Background noise. As with mobile devices, background noise whilst on a call is a sign that somebody else could be listening. Listen out for static, buzzing or clicks on the line.

Explanation:

6 0
2 years ago
Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive
galina1969 [7]

Answer:

Option(A) i.e "Security information and event management (SIEM)" is the correct answer for the given question.

Explanation:

The security information and event management (SIEM) is the product of the software and it gives the service of security.The security information and event management (SIEM) is the combination of security information management and security event management (SEM). The main advantage of Security information and event management (SIEM) provides real-time security alerts.

The Issac uses  Security information and event management (SIEM) and perform the log review for his organization. The Security information and event management review the massive amount of data and also provide better security

Following are the description why the others options are incorrect

  • Intrusion prevention system (IPS) is used for the threating purpose it checks the threats in the network flow so according to question this option is incorrect.
  • Data loss prevention (DLP) is used for the purpose of data loss so according to question this option is incorrect.
  • A virtual private network (VPN) is used to connect the network virtually so according to question this option is incorrect.
7 0
3 years ago
Which set of sides will not make a triangle?
stellarik [79]

Answer:

The answer is B

Explanation:

12 cm, 7 cm, and 5 cm.

Add 5 + 7 and get 12

Sides added must be greater, not equal to.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Corinne would like to click on the link at the bottom of a Web page but she only sees the top portion of the page. She should __
    6·2 answers
  • "Write code that prints: Ready! countNum ... 2 1 Start! Your code should contain a for loop. Print a newline after each number a
    7·1 answer
  • The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
    7·1 answer
  • How does collaborating on a project improve its quality?
    9·1 answer
  • 1. What is Java SE?
    11·2 answers
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
    12·2 answers
  • Approximately how long did it take, in minutes, for the body to return to normal after the intake of water.
    11·1 answer
  • To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a w
    12·1 answer
  • What are the six primary roles that information system play in organizations? How are information system used in each context
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!