1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
4 years ago
15

________ is used to undo unwanted database changes.

Computers and Technology
2 answers:
trapecia [35]4 years ago
8 0
Backward Recovery
<span> ________ is used to undo unwanted database changes. </span>
riadik2000 [5.3K]4 years ago
5 0
Backward Recovery would be the answer.

(:
You might be interested in
Ross has to create a presentation for his class but can't decide on a topic. What should he do?
dmitriy555 [2]
The answer is C. Choose a topic that he is interested in and wants others to know more about.
3 0
4 years ago
Read 2 more answers
A company wishes to move all of its services and applications to a cloud provider but wants to maintain full control of the depl
Brrunno [24]

Answer:

b. IaaS  Infrastructure as a Service

Explanation:

  • Infrastructure as a Service is a cloud infrastructure service or platform which provides with the computing resources like servers, storage services, backup service and networking services.
  • These services are provided to the organizations by cloud service providers to fulfill their business and resources requirements and the users have to purchase these services.
  • These resources and services are provided from the data centers of the cloud service providers.
  • It is beneficial to utilize these virtual services from a third party provider  than to buy the hardware equipment and the consumers can use these services as per their needs and are charged accordingly instead of purchasing their own hardware which often gets difficult to maintain.
  • These services also provide and manage the operating systems, the applications and provides with the backup services, internet connection, security such as firewall and access controls and manage storage such as hard drives. Users can install and run any applications.
  • Iaas offers scalability as it can add resources and services with the growing requirements of the users.
4 0
3 years ago
What is the acronym that helps you remember the order of math operations?
polet [3.4K]
PEMDAS (parenthesis, exponents, multiplication, division, addition, subtraction). 
7 0
3 years ago
Read 2 more answers
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
oksano4ka [1.4K]

Sending potentially sensitive information by email

Potentially sensitive information can be sent via Email only if the Email is encrypted

Explanation:

No doubt Email is an inexpensive efficient means of communicating quickly. But it is prone to hacking and it is not a secure mechanism. In order to add security ,the Email needs to be sent in an encrypted form. Banking and HIPAA regulations require the emails to be sent in encrypted form as it is a secure mechanism. Even if one has the consent from the client , the Email has to be in encrypted. Even if the Organization's e-mail system has appropriate firewalls and related infrastructure , the golden rule is to send encrypted format Emails.

7 0
4 years ago
A company uses DHCP servers to dynamically assign IPv4 addresses to workstations. The address lease duration is set as 5 days. A
nikitadnepr [17]

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

FF-FF-FF-FF-FF-FF can be defined as the layer 2 address broadcast which is often used on ethernet frames as well as help to broadcast all equipment due to the fact broadcast is made possible through Ethernet networks in which the Frames are addressed to reach every computer system on a given LAN segment as far as they are addressed to MAC address FF:FF:FF:FF:FF:FF.

255.255. 255.255 can be seen as the layer 3 address which help to address the exact same hosts because it enables the broadcast address of the zero network which is the local network due to the fact that the IP broadcasts are often used by BOOTP and DHCP clients to find and send requests to their respective servers in which a message sent to a broadcast address may be received by all network-attached hosts.

Therefore the Layer 2 and Layer 3 destination addresses which the message contain are FF-FF-FF-FF-FF-FF and 255.255.255.255

7 0
4 years ago
Other questions:
  • All network operating systems today use the ____ protocol suite for internet communication.
    14·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • . Convert BAC4 from hexadecimal to decimal. Show your work.
    9·1 answer
  • How many four-digit personal identification numbers (PIN) are possible if the PIN cannot begin or end with a 0 and the PIN must
    6·1 answer
  • Which function of NOS involves swapping programs and files
    6·1 answer
  • Identify at least five different Arts, A/V Technology, and Communications careers that you could pursue in your home state, and
    11·1 answer
  • Complete the code to convert a float to a string. <br> answer=5.3 <br> strAnswer=__ (answer)
    12·2 answers
  • What are the determinants of price elasticity of demand?​
    11·2 answers
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • Why big data influnce the rise of AI<br><br>​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!