1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
3 years ago
8

If a database named Contacts has a table named tblEmployees and another database named Orders links to that tblEmployees table,

where is the data stored?
Computers and Technology
1 answer:
Vlad1618 [11]3 years ago
5 0

Answer:

cache I think

Explanation:

I am not sure or memory HDD or SSD

You might be interested in
An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al
Aloiza [94]
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




8 0
3 years ago
Read 2 more answers
A pangram is a sentence that contains all the letters of the English alphabet at least once. For example, the quick brown fox ju
erma4kov [3.2K]
Do you want this in paragraph form ?
5 0
3 years ago
Security administrators can use either the PowerShell command line or the graphical user interface of the Server Managerâs Roles
AleksAgata [21]

Answer:

Security administrator can use power shell command line or the GUI to "Promote a windows server to a domain controller".

Explanation:

A domain controller is a type of server that is used to authenticate the access of the system to the users to resources of windows. Power shell is an important tool that is used to perform different tasks of administration. We can user this tool as security administrator to Promote a Windows server to a domain controller.

3 0
3 years ago
Henry wants to use handheld computers to take customers' orders in her restaurant. He is thinking of using custom written, open
DochEvi [55]

Answer: See explanation

Explanation:

Custom written software refers to the software that's developed for some particular organization or users. It's crates in order to meet the unique requirements of a business.

Since Henry is thinking of using custom written, open source software, then a custom written software will be used. Examples of custom written software will be automated invoicing, bug tracking software, E-commerce software solutions etc.

7 0
2 years ago
In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____. G
sdas [7]

Answer:

C.R.U.D stands for Create, Read, Update, Delete.

Explanation:

6 0
2 years ago
Other questions:
  • On what dates did the 2016 Olympics take place( list all)
    9·2 answers
  • Which heat transfer can be described as currents of warm air rising and cool air falling
    12·1 answer
  • During which part of geologic time were dinosaurs most common?
    11·2 answers
  • A student opens a recently purchased software package and begins reading the enclosed materials. What information might be inclu
    6·1 answer
  • What is the phase of a waveform ?
    15·1 answer
  • Data from RAM may be placed where to free up space? Log file Swap file Word file Print spool file
    10·1 answer
  • How many questions do you have to answer before you can use direct messages on Brainly?
    13·2 answers
  • Why is it important to think about the programming language to use?
    6·1 answer
  • Read-only memory chips are used to
    11·1 answer
  • External hard drives typically connect to a computer via an external port (such as a usb or ____ port) or a wireless connection.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!