1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
15

________ is used to undo unwanted database changes.

Computers and Technology
2 answers:
trapecia [35]3 years ago
8 0
Backward Recovery
<span> ________ is used to undo unwanted database changes. </span>
riadik2000 [5.3K]3 years ago
5 0
Backward Recovery would be the answer.

(:
You might be interested in
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
Serjik [45]

A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers

4 0
2 years ago
Which of the following is the BEST solution to allow access to private resources from the internet?
notsponge [240]
FTP stands for file transfer protocol. FTP is used to transfer files between computers over the Internet. FTP servers can be setup to allow users to access the information anonymously or require registration for access.
7 0
3 years ago
In a relational database model, a(n) _____ operation pares down a table by eliminating columns according to certain criteria. in
nikklg [1K]

I guess the correct answer is Project

If thе usеr is intеrеstеd in sеlеcting thе valuеs οf a fеw attributеs, rathеr than sеlеctiοn all attributеs οf thе Tablе (Rеlatiοn), thеn οnе shοuld gο fοr Prοjеct Οpеratiοn.

8 0
3 years ago
A company is concerned that hackers may gain access to its computer system or that it may be
lesantik [10]

Answer:

computer virus is an spreading disease in a computer

Explanation

a virus can be spread through many ways by servers , wifi ,and the cloud

so its better to have an safe and secure firewall by your domain or you could use cloud computing to test viruses

it also can spread pretty fast so u better have a good antivirus

4 0
2 years ago
The ________ of a cpu dictates how many instructions the cpu can process each second.
makkiz [27]
Gigahertz is the correct answer I believe.
My processor is a i5-6600k with 3.5ghz so assuming GHz is the speed I believe it would be gigahertz
3 0
3 years ago
Other questions:
  • Select all that apply.
    15·2 answers
  • 2. Statement: "I don't agree with you." Nonverbal gesture: Type of gesture:
    6·1 answer
  • What is a Limited Purpose credit card
    11·2 answers
  • In a typical e-mail address, what is the "host"? A. an account designated by a user name. B. the computer that houses an Interne
    7·1 answer
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    6·1 answer
  • "Which NET command is used on a Windows PC to establish a connection to a shared directory on a remote server?"
    11·1 answer
  • A thesaurus is an example of a(n)
    5·2 answers
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • Ron is creating building blocks in Word. How can he make the building blocks that he created available?
    10·2 answers
  • What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!