1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
15

Databases offer many security features including passwords to provide authentication, access levels to determine who can access

the data, and access controls to determine what type of access they have to the information.1. True2. False
Computers and Technology
1 answer:
Murljashka [212]3 years ago
7 0

Answer:

True

Explanation:

When using databases in a project, not everyone has the same access level, e.g the database admin may have the highest level of access (access to data on live mode), the software testers have their own level of access (access to data on test mode) and so on.  

You might be interested in
____ languages create source code using words and structures similar to spoken language.​
zzz [600]

Programming Languages.

Explanation:

Programming languages create source code using words such as "IF", "IF NOT" which is similar to spoken language.

Examples of Programming languages are C++, COBOL and Java.

6 0
3 years ago
Who distributes IP Address?
adoni [48]

Answer:

 The IP address is the internet protocol address that is basically assign to every device that is particularly connected to the network of the computer. The internet protocol is basically useful for the communication.

The main function of the IP address is that:

  • Used in the location addressing
  • For the network and host interface identification.

The IP address is basically distributed by the IANA ( Internet assigned number authority) and the main responsibility of the internet protocol is to distribute the IP address with the help of the RIR (Regional internet registries).

6 0
3 years ago
Part 3a. Largest power of two less than (10 pts) Implement the method public static int largestPow2LessThan(int n) which calcula
Oksi-84 [34.3K]

Answer:

Check the explanation

Explanation:

========================================================================

// Part 3 (a)

public static int largestPow2LessThan(int n) {

   int two = 1;

   while (two * 2 < n) {

       two *= 2;

   }

   return two;

}

================================================================

5 0
3 years ago
How many total bits are required for a direct-mapped cache with 128 blocks and a block size of 8 bytes, assuming a 4GB main memo
Marysya12 [62]

Answer:

32

Explanation:

Total bits will be 32 only as address is of 32 bits

(meaning to ask the size of the cache)

7 0
2 years ago
Write a void function SelectionSortDescendTrace() that takes an integer array, and sorts the array into descending order. The fu
salantis [7]

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

void SelectionSortDescendTrace(int numbers[], int numElems) {

int maxInd;

for (int i = 0; i < numElems - 1; ++i) {

maxInd = i;

for (int j = i; j < numElems; ++j) {

if (numbers[j] > numbers[maxInd]) {

maxInd = j;

}

}

int temp = numbers[i];

numbers[i] = numbers[maxInd];

numbers[maxInd] = temp;

for (int j = 0; j < numElems; j++) {

cout << numbers[j] << " ";

}

cout << endl;

}

}

int main() {

int numbers[10];

int numElements = 0;

for (int i = 0; i < 10; i++) {

cin >> numbers[i];

if (numbers[i] == -1)

break;

++numElements;

}

SelectionSortDescendTrace(numbers, numElements);

return 0;

}

8 0
3 years ago
Other questions:
  • What registry file contains installed programs' settings and associated usernames and passwords?​?
    13·1 answer
  • If you print a document with red green or blue underlines will they show up on printed pages
    14·1 answer
  • What are the advantages and disadvantages of fortran?
    13·1 answer
  • Which style did Jack use on the vocabulary words in reports?
    14·2 answers
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • A _____ can be used to create and test prototypes, develop interfaces, and simulate factory layouts and assembly lines, without
    10·1 answer
  • Expectation on Information Technology Fundamental​
    12·1 answer
  • Which one of the statements best characterizes the current state of e-commerce?
    15·1 answer
  • Difine Mainframe Computer~<br><br><br><br><br><br><br><img src="https://tex.z-dn.net/?f=%20%5C%3A%20%20%5C%3A%20" id="TexFormula
    12·2 answers
  • What is Cloud computing? Explain briefly
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!