1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
14

قواعد البيانات الموزعه​

Computers and Technology
1 answer:
Monica [59]3 years ago
6 0

Answer:

Translation : Distributed Databases

Explanation:

You might be interested in
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
Match the job roles with their appropriate qualifications. business analyst multimedia artist network and computer systems admin
Tanya [424]

Answer:

business analyst:  degree in business administration arrowRight  

multimedia artist : training in 2D and 3D modeling arrowRight​

network and computer systems administrator: master's course in management information systems arrowRight  

software quality assurance engineer: knowledge of the software lifecycle process arrowRight  

Explanation:

Please check the answer section

6 0
3 years ago
Read 2 more answers
( ABOVE TRUSTED HELPER ONLY)Why does my rank say that I have one
prohojiy [21]
That’s a really good question but that means something is wrong with it refresh your screen or close the page app
6 0
3 years ago
Read 2 more answers
What should we do to prevent software piracy?
frozen [14]

Answer:

1. Read the End User License Agreement (EULA) for each software product you purchase.

2. Purchase CD software only from reputable resellers.

3. Purchase software downloads directly from the manufacturer's website.

4. Register your software to prevent others from attempting to install your software on their computers.

5. Report piracy if you discover that software you purchased is not authentic or if you suspect that an online reseller or retail establishment is selling counterfeit software.

Link: https://www.techwalla.com/articles/how-to-stop-software-piracy

-Please mark as brainliest!- Thanks!

7 0
3 years ago
Can't get Brainly to load on my Apple Mac. Why won’t it load? Does it need another program to work?
Lorico [155]

Answer:

Did you download it or did you open it in a "New Tab"?

6 0
3 years ago
Read 2 more answers
Other questions:
  • While working on a forty-slide PowerPoint presentation, a user needs to quickly look over the six slides that have orange backgr
    10·1 answer
  • Your dad just purchased a new desktop with Windows 8 Professional. He is calling you, informing you that he is unable to remote
    9·1 answer
  • Here's a thought: Why does your Brainly ranking keep going down?
    6·2 answers
  • Which does an icon on the desktop signify?
    12·1 answer
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • Suppose that outFileis an ofstreamvariable and output is to be stored in the file outputData.out. Which of the following stateme
    14·1 answer
  • You are running out of storage space on one of your servers. you need to purchase an external hard drive, as there are no drive
    8·2 answers
  • What is the purpose of the ISOWEEKNUM function? determines how many workdays are in a certain week determines how many workdays
    12·2 answers
  • Which access object cannot be used to enter or edit data
    13·2 answers
  • 48
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!