1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
11

An archive of files that usually contain scripts that install the software contents to the correct location on the system is ref

erred to as a:1) package manager
2) DBMS
3) tarball
4) router
Computers and Technology
1 answer:
Anika [276]3 years ago
8 0

Answer:

Option 3 is the correct answer for the above question.

Explanation:

  • A tarball is a software which is used to encrypt the other software or hide the other software and make it small. It again makes the original software program from the encrypted ones.
  • It is used to make the file sort and can use for the transfer which takes some amount of memory.
  • The above question asked about that technology which is used to make encrypted software from the original software and use it with the help of some script. Then the answer is tarball which is referred to from option 3. Hence Option 3 is the correct answer for the above question while the other is not because--
  • Option 1 states about the package manager which is used to manage the library only.
  • Option 2 states about the DBMS which is used to manage the database.
  • Option 4 states about the router which is used for the internet.

You might be interested in
Suppose we are comparing the implementations of insertion sort and merge sort on the same machine(You don’t need to know the alg
Anuta_ua [19.1K]

Answer:

123456789o0

Explanation:

4 0
3 years ago
What are table buffers?
laiz [17]

Answer:

Table buffers are tools used to avoid the process of accessing a database in servers.

4 0
3 years ago
How can your web page design communicate your personal style
Levart [38]

Answer:

Web design is very unique, you can express your feelings through creating a page.

7 0
3 years ago
Which option is used in order to configure switchboards for a complex database?
Ostrovityanka [42]

Answer:

switch board manager

Explanation:

8 0
3 years ago
Read 2 more answers
Which computer is the fastest to process complex data?
Andreas93 [3]

Answer:

D. 2.6 GHz processor, 8 GB RAM, 1 TB hard drive

Explanation:

In Computer science, the processor speed of a computer can be defined as the number of cycles per seconds that the central processing unit (CPU) of a computer operates. The processor speed typically determines the number of information that a computer is able to execute per seconds. Therefore, the higher or faster the processor speed the faster the computer in processing complex data.

Generally, the processor speed of a computer is measured in megahertz (MHz) or gigahertz (GHz).

Additionally, Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily. RAM is measured in megabytes (MB) or gigabytes (GB).

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

Hence, the computer which is the fastest to process complex data is the 2.6 GHz processor, 8 GB RAM, 1 TB hard drive because of the higher processor speed and RAM size.

7 0
3 years ago
Other questions:
  • 1. Of Facebook, Twitter, and LinkedIn, which do you think is the best platform for marketing your personal brand? Explain.
    12·1 answer
  • What is an identifier? Give an example of an identifier.
    13·1 answer
  • The Leader Motive Profile (LMP) includes a: a. high need for power. b. low need for achievement. c. moderate need for power. d.
    6·1 answer
  • )the number of levels in a tree is called
    6·1 answer
  • In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
    8·1 answer
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • What is the importance of server modules and add-ons?
    9·1 answer
  • You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
    7·1 answer
  • How do i stop my computer from automatically connecting to a wireless network
    5·1 answer
  • I just logged onto brainly and all my questions were deleted and i lost 2 brainliest. What has brainly done to my account I also
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!