1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhannawk [14.2K]
4 years ago
15

A. True

Computers and Technology
1 answer:
Anuta_ua [19.1K]4 years ago
5 0
100% TRUE AND VERY IMPORTANT
In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

From my experience, limit the number of those with full access (1-2 people, 3 at most).
Also, perform daily backups. If this data is critical, you can set timers for it to be backed up during intervals in the day.
Relationship databases or databases that can be shared should only be shared for viewing.
You might be interested in
Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a bu
Fed [463]

Answer:

Card style

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode.

II. Print Mode.

III. Drift Layout.

Generally, end users are able to print a hard copy (physical copy) of the word document they created through the use of a printer.

In this scenario, Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a business card format. Therefore, the option she should choose is Card style.

The Card style is designed to present informations in a grid-like format or landscape arrangement.

4 0
3 years ago
In symmetric key cryptosystem, assume that Alice and Bob have set up a common key Kab. This key is only known to Alice and Bob.
azamat

Answer:

yes

Explanation:

If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication

4 0
3 years ago
Question # 6
insens350 [35]

Answer:

April 30, 1993

Explanation:

On April 30, 1993, four years after publishing a proposal for “an idea of linked information systems,” computer scientist Tim Berners-Lee released the source code for the world’s first web browser and editor.

4 0
3 years ago
What are the odds that you find someone you know in person on here
jenyasd209 [6]

Answer:

0

Explanation:

As far as I know, no one I know, even knows that brainly exists. Those who do  know about it don't use it.

6 0
3 years ago
The function of network switch is to _____.
enyata [817]

Answer:Its C.

Explanation:

3 0
3 years ago
Other questions:
  • What human activity would cause a decrease in the population of another species? (The action of humans would impact one species,
    9·1 answer
  • You have been asked to delete some data from medisoft but find that there is no delete button. what is another method you can us
    10·1 answer
  • How would you display all your photographic work in your résumé, if you have a large volume of work?
    10·1 answer
  • How should you decide what to wear to an interview? What kind of things should be considered?
    12·1 answer
  • Jeremy wants to run a program file from the command prompt. Which of the following should Jeremy type in the command prompt wind
    8·2 answers
  • When using a function to preform a calculation how would you select the range of numbers to use
    13·1 answer
  • Consider the following statement from the CS Principles course framework: The global distribution of computing resources raises
    12·1 answer
  • Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is
    14·1 answer
  • What is the difference between i++ and ++ii?
    6·1 answer
  • Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!