1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
10

Which of these describes the functionality of a database? Check all of the boxes that apply.

Computers and Technology
2 answers:
pshichka [43]3 years ago
7 0

Answer:

it's

2) allows you to compare several tables simultaneously

3) accesses and retrieves data

4 ) can be used by multiple users

    I did it on Assignment and got it correct!!!

Explanation:

Murrr4er [49]3 years ago
6 0

-allows you to compare several tables simultaneously

can be used by multiple users

-requires you to update data directly in tables

You might be interested in
Which of the following is a default letter assigned for the primary hard drive
d1i1m1o1n [39]

C

.............

When hard disk drives became standard in most PCs in the later 1980s, since the first two letters were already commonly used for these floppy drives, they logically labeled the third storage device “C”, even though it now tended to be the main storage medium for the computer, including usually containing the operating system.

6 0
3 years ago
Read 2 more answers
Which of the following topics is too broad for a 10-minute speech? A. classes offered in interior design B. the history of moder
aksik [14]
I would say it is <span> B. the history of modern interior design 
Because this subject stretches pretty far into history</span>
3 0
3 years ago
Read 2 more answers
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
There are two kinds of emotions: positive and negative. True False
fgiga [73]

Answer:

False

Explanation:

There are many emotions the human brain can experience

6 0
2 years ago
Read 2 more answers
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
Other questions:
  • What are the different nail disorders?
    13·1 answer
  • What is the forging of the return address on an email so that the email message appears to come from someone other than the actu
    11·1 answer
  • Help me or I'll go insane I've 6x already I'm about to lose it!!!!
    11·2 answers
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    12·1 answer
  • Implement the function printTwoLargest that inputs an arbitrary number of positive numbers from the user. The input of numbers s
    14·1 answer
  • Difference between automated testing and manual testing
    13·1 answer
  • This can change the fit of your respirator. A) A mustacheB) A beardC) Weight gainD) All of the above
    15·1 answer
  • Which feature is not in ms PowerPoint​
    12·1 answer
  • Determine the value of a and b at the end of the following code segment:
    12·1 answer
  • Which word describes an important characteristic of good computer
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!