1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
3 years ago
9

In a database, a collection of related fields that describes some object or activity is referred to as a ____.

Computers and Technology
1 answer:
topjm [15]3 years ago
7 0

In a database, a field is a collection of characters put together<span>; a collection of related fields that describes some object or activity is then referred to as a RECORD (which is sometimes called a row). The fields that make up a row are collectively relevant to a specific entity.</span>

You might be interested in
What was the first e-commerce service?
docker41 [41]

The first e-commerce service would be A)Banking. Hope this helps.

8 0
3 years ago
A(n) __________ is a set of technologies used for exchanging data between applications and for connecting processes with other s
Harrizon [31]

Answer:

The answer is "Option ".

Explanation:

The SOA stands for "Service-Oriented Architecture", which is primarily known as a service set and these services enable you to communicate with each other. In the communication, it may require simple data to transfer to two or more services, which can be organized by those operations, and other options were incorrect, that can be explained as follows:

  • In option a, It is a business software, which is used to organized data, that's why it is wrong.
  • Option b and Option d both are wrong because the mashup process is used only on web services, which is not a part of SOA , that's why it is wrong.
5 0
3 years ago
Read 2 more answers
PLEASE HELP WILL MARK BRAINLIEST ASAP
Charra [1.4K]

Answer:

This is a heading

Explanation:

This is a paragraph does not exist. You would simply use p for paragraph. Therefore This is a heading is the correct answer.

8 0
2 years ago
The incident response team reviewed the security logs and discovered that the network had been breached, due to a misconfigured
natka813 [3]

Answer:

This is a failure of prevention model of computer security

Explanation:

Because the firewall was misconfigured so attack prevention mechanism failed to resist the attack and the security of computer is compromised. Prevention is an important model of operational security because <em>protection </em>is possible firstly attacks are prevented from targets and if not prevented and failed then they are detected and finally security department respond to that attack.

protection = <em>prevention   </em>if <em>prevention </em>failed than (detection+response)

4 0
3 years ago
What general strategies can the network managers use to reduce congestions?
Harrizon [31]

Answer:

 There are different types of strategies that can be used by the network manager for reducing the congestion are as follows:

  • By monitoring the traffic of the network properly we can easily reduce the congestion in the network.
  • By segmenting the network properly, it helps to reduce the network congestion.
  • We can also reconfiguring the TCP/IP (Transmission control protocol) setting on the network.
  • We can also use the backpressure routing technique.

7 0
2 years ago
Other questions:
  • Lydia noticed that she feels tired and out of breath after walking her dog up a hill in the park. Which area of fitness does she
    8·1 answer
  • Write a program that reads students’ names followed by their test scores. The program should output each student’s name followed
    13·1 answer
  • Which of the following statements is TRUE?
    11·1 answer
  • Consider two communication technologies that use the same bandwidth, but Technology B has twice the SNR of technology A. If tech
    14·1 answer
  • 3.
    12·1 answer
  • Write a python statement that print the number 1000
    6·1 answer
  • Explain the consequences of using bits to represent data.
    10·1 answer
  • I need help!! I decided to go back to college this year and am taking Intro to Logic and Programming. I have an assignment due t
    5·1 answer
  • which of the following is the most appropriate way to write css style for the font family property in html
    8·1 answer
  • which explains a method to avoid violation of personal information through phishing? do not carry around your social security ca
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!