1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
4 years ago
15

________ is used to undo unwanted database changes.

Computers and Technology
2 answers:
trapecia [35]4 years ago
8 0
Backward Recovery
<span> ________ is used to undo unwanted database changes. </span>
riadik2000 [5.3K]4 years ago
5 0
Backward Recovery would be the answer.

(:
You might be interested in
Define the term hardwar<br><br>​
bezimeni [28]

Answer:

tools, machinery, and other durable equipment.

Explanation:hardware in a computer are the keyboard, the monitor, the mouse and the central processing unit.

4 0
3 years ago
Read 2 more answers
The mac group does not replace the primary functions of eocs or other dispatch organizations. True or False
Oxana [17]

Answer:

TRUE

Explanation:

MAC - multi-agency coordination is a group of executives or administrators that have the authority to control agency funds or resources while EOCs -  Emergency operation centers are in charge of carrying out of emergency tasks that requires preparedness or disasters, they ensure that work continues even in case of emergency and disasters.

7 0
3 years ago
Web designers use programming languages to write websites. A True <br> B False​
KonstantinChe [14]

Answer: False

Explanation:

Web designers are not using programming languages to write websites.

6 0
3 years ago
Read 2 more answers
Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m
attashe74 [19]

Answer:

Data is one of the most valuable resources today's businesses have. ... There are various data-gathering methods you can use with the help of your ... When it comes to data businesses collect about their customers, ... Third-party data offers much more scale than any other type of data, ... Big White Cursor.

Explanation:

4 0
3 years ago
Which type of function distill the information contained within a file (small or large) into a single fixed-length number, typic
Luda [366]
As far as I remember, message-digest functions distill the information contained within a file (small or large) into a single fixed-length<span>number, typically between 128 and 256 bits in length. This function is designed to protect the integrity of a piece of data to define changes to any part of a message.</span>
7 0
4 years ago
Other questions:
  • Which term describes the order of arrangement of files and folders on a computer?
    11·1 answer
  • 8 POINTS!!!!!!!!
    6·2 answers
  • Write a program that accepts three decimal numbers as input and outputs their sums?​
    5·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • What is a single-user computer?
    8·1 answer
  • How are IP addresses usually written?
    7·1 answer
  • What are candid shots? what are posed shots?
    13·1 answer
  • When does a soft page break occur in a document
    9·1 answer
  • Please tell fast plzzzzzz​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!