1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
4 years ago
6

What is the financial aspect for a business as to what database software they will buy?

Computers and Technology
1 answer:
Masteriza [31]4 years ago
8 0

Answer:  Database software is bought on basis of the processing, cost, requirement etc for any particular . According to the financial perspective the database  software should have the following characteristics:-

  • Database software that has most accurate and main feature according to the business requirement is selected for buying and the others with extra features are not considered as more feature cost more amount  which is not needed.
  • Database software which is still in progress to be built is pre-booked and money is invested on it because the price of the required software might increase after getting completed.
  • Scalable database software should be bought so that it can extend according to need at low cost.

 

You might be interested in
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
What precautions should be taken to make a computer more secure ​
Sergeeva-Olga [200]

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

4 0
3 years ago
If a database table is to hold data on 52 students it must have 52?
Marina CMI [18]

Answer:

yes

Explanation:

6 0
3 years ago
Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.
Sindrei [870]

Answer:

Kindly check explanation

Explanation:

Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.

A shell script could be written for a control flow construct :

if [expression]

then (command 1)

else (command 2)

.....

7 0
3 years ago
The part of the computer that provides access to the internet is the-?
Rina8888 [55]
The answer is D. Modem
7 0
3 years ago
Read 2 more answers
Other questions:
  • What Is the output of the following: =OR (5 &lt;7, 16*Rand ()&gt;23,FALSE)
    5·1 answer
  • The _________keys include the home, end, and arrow keys.
    13·1 answer
  • Consider the problem of finding the distance between the two closest numbers in an array of n numbers. (The distance between two
    13·1 answer
  • Is LTE faster than 4G?
    8·1 answer
  • I'm taking a class on how to make a movie, and it offers some apps that would be helpful in the process. The thing is, I don't h
    9·2 answers
  • I need help in raft survival ocean nomad I was traveling and now I can't enter the island or go back home (raft). Please help me
    15·1 answer
  • Sandi wants to check the average grades in her classroom. Which loop or algorithm should she use?
    8·1 answer
  • PLEASE HELP! 100 POINTS!
    7·1 answer
  • What is a query? State it's uses.​
    8·1 answer
  • QUESTION 8
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!