1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
14

What is used to configure data sources for applications that require access to a database?

Computers and Technology
1 answer:
Radda [10]3 years ago
6 0
A network is used to configure data sources for applications that require access to a database?
You might be interested in
Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:
____ [38]

Answer:

c is the answer I'm pretty sure but wait for more

3 0
3 years ago
Technical term of stealing personal information in social media.​
iVinArrow [24]

Answer:

stalking/identity fraud

7 0
3 years ago
A variable that can be modified from anywhere within a program is called a?
larisa86 [58]
A - a global variable
6 0
3 years ago
Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is
Colt1911 [192]

Answer:

He should: Format the text file with comma-separated values and save as CSV file type. ]

Explanation:

hope this helps!

5 0
3 years ago
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
4 years ago
Other questions:
  • You want to register the domain name ABCcompany.org, but the registration service is not allowing you to do that. What's the mos
    10·1 answer
  • Which of the following is NOT a common GUI component? O a. Label b. Button c. Key press d. Text box
    12·2 answers
  • Write a program that takes two ints as input from the keyboard, representing the number of hits and the number of at bats for a
    10·1 answer
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • The file extensions .webm, .m4v, and .ogv are used for:
    15·1 answer
  • What can I do if my mouse on my laptop keeps freezing on me for 5 minutes
    11·1 answer
  • What is a bug?
    11·2 answers
  • Im boing exam help please In a category-based course grading system, teachers weigh a student's performance in all courses. all
    7·2 answers
  • Write a method that takes a Rectangle as a parameter, and changes the width so it becomes a square (i.e. the width is set to the
    8·1 answer
  • Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!