1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
14

Bobby is investigating how an authorized database user is gaining access to information outside his normal clearance level. Bobb

y believes that the user is making use of a type of function that summarizes data. What term describes this type of function
Computers and Technology
1 answer:
Sveta_85 [38]3 years ago
7 0

Answer:

Aggregate Function .

Explanation:

The aggregate function returns the single value of the entire column of the database management system. The Aggregate Function is used in the SELECT statement and the GROUP BY clause.  

The sum(),avg(), etc are some examples of Aggregate Function in the database with the help of aggregate function bobby gains the access to information above the usual clearance point. and summarizes the data.

You might be interested in
When should you save your document?
Verdich [7]

Answer:

b. when you have completed a document

4 0
3 years ago
Read 2 more answers
An employee of a large corporation remotely logs into the company using the appropriate username and password. The employee is a
LenKa [72]

Answer: I gave 6 you can choose from.

Integrity

Scalability

Quality of Service

Fault of Tolerance

Powerline Networking

Security

6 0
2 years ago
python This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defi
riadik2000 [5.3K]

Answer:

Check the explanation

Explanation:

arrow_base_height = int(input('Enter arrow base height:\n'))

arrow_base_width = int(input('Enter arrow base width:\n'))

arrow_head_width = arrow_base_width

while arrow_head_width <= arrow_base_width:

   arrow_head_width = int(input('Enter arrow head width:\n'))

print()

for i in range(arrow_base_height):

   for j in range(arrow_base_width):

       print('*', end='')

   print()

for i in range(arrow_head_width):

   for j in range(arrow_head_width-i):

       print('*', end='')

   print()

Kindly check the code output below.

5 0
3 years ago
Read 2 more answers
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
Pls answer i will give 20 points
Misha Larkins [42]

Answer:

Penicilium roqueforti

4 0
2 years ago
Other questions:
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • Tara referred to various information sources while writing her research paper. How can she acknowledge these sources in her docu
    8·1 answer
  • Fundamental types of data, such as strings, integers, and real numbers, are known as
    5·1 answer
  • What is the post condition of an expression or variable
    11·1 answer
  • The first computer (the eniac was how big
    8·1 answer
  • Consider the following code segment: ArrayList bulbs = new ArrayList(); bulbs.add(new Light()); bulbs.remove(0); bulbs.add(new L
    15·2 answers
  • 1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
    10·1 answer
  • What PowerShell command can be used to clean up old update files on a WSUS server, including unused update files, old revisions,
    10·1 answer
  • What symbol indicates that material has been copyrighted?
    8·2 answers
  • Assume that an int variable age has been declared and already given a value. Assume further that the user has just been presente
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!