1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrei [34K]
3 years ago
15

​Browser-based database applications differ from traditional applications in that they​ ________.

Computers and Technology
1 answer:
alukav5142 [94]3 years ago
8 0

Answer:

The correct option to the following question is option A.

Explanation:

Traditional database system is also known as the data warehouses and the relational database system which have been primary way organizations and the businesses have analyzed and stored their data and information for past 20 to 50 years. Traditional application of database systems are designed from ground up to the work with the data that has the primarily structured data.

A Web database or a browser-based database is the database application which is designed for accessed and managed from the Internet. Website or browser operators can be manage the collection of present analytical results-based and data on the data in the Browser-based database application.

You might be interested in
Which of the following is an example of how the healthcare industry uses computer programming? (5 points)
IgorC [24]
3-D prosthetics would most likely be the answer, also, don’t copy links it’s most likely not the answer anyways.
5 0
2 years ago
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
Write a single statement that will print the message "first is " followed by the value of first, and then a space, followed by "
Hatshy [7]

Answer:

Statement:

print("first is "+str(first)+"  second = "+str(second)) # It is a python statement where first and second are variable of any type.

Explanation:

  • The above statement is the print statement that prints the value of first and second variables like in the form of "first is" value of the first variable, then space, then "second = b" and then the value of the second variable.
  • The value for the first and the second variable of any type but it convert it into string form with the help of str() function in the print statement.
  • The string of the print statement can be formed by the help '+' operator which adds the string with the value and the other string in print statement in java and python language.
4 0
3 years ago
"someone has tampered with your computer and erased data". what kind of computer threat is this
pishuonlain [190]
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>
4 0
3 years ago
Why would a team choose to employ a zone defense over a person to person defense?
vova2212 [387]

Answer/Explanation:

Zone defense is chosen if MULTIPLE people are attacking one spot that's why they would choose zone defense.

Person to person defense is when 1 person is attacking one spot so somebodies sent out to defend it.

<u><em>~ LadyBrain</em></u>

7 0
3 years ago
Other questions:
  • The Huntington Boys and Girls Club is conducting a fundraiser by selling chili dinners to go. The price is $7 for an adult meal
    8·1 answer
  • According to the family life course development framework, the __________ stage of the family life cycle comes to an end with th
    7·1 answer
  • What are six external parts of a computer
    11·1 answer
  • Displays are geared for a specific resolution. what is this resolution called?
    15·1 answer
  • According to the video, which of the following is communication between two individuals? Intrapersonal Communication Public Spea
    7·2 answers
  • Which of the following is NOT a strength of monetary policy?
    15·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were discussed in this unit or
    10·1 answer
  • Nearly all personal computers are capable of serving as network servers.
    10·2 answers
  • As Jane was setting up her projector, she realized that the images on the screen appeared blurred. How would Jane sort out the i
    6·2 answers
  • 2
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!