1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
15

You're looking for a DBMS to purchase and install for use with the database you're designing. Because of future expansions, you

want to stay away from systems that have file size limits. Which of the following DBMSs should you likely avoid?
Computers and Technology
1 answer:
bixtya [17]3 years ago
5 0

The question above has multiple answers as stated below;

A. MySQL<span>
B. Oracle Express
C. PostGres
D. Access</span>


The best answer to this question is (D) Access


The total database for an Access database is 2GB. Access is great only for the little stuff and generally do not scale very well. MySQL, on the hand, is solely dependent on the operating system being used. MySQL file size limits can reach size of upto 256 TB

You might be interested in
Documentation for evidence which includes exactly what, when, and from whom evidence was collected, the condition of this eviden
emmasim [6.3K]

Answer:

Answer to the following question is CoC(chain of custody ).

Explanation:

  • CoC(chain of custody ) is the legal document and it is the evidence that is handled during an investigation of the case.
  • In the criminal trials, prosecution must be typically proved that all the evidences is handled according the documented and unbroken CoC.
  • In the court, CoC(chain of custody) documentation has been presented by prosecutions to prove the evidence, related to an alleged crimes, and it has been in possession of  defendant.
4 0
4 years ago
What is the letter for the trash directory on windows 10?
myrzilka [38]
It's usually in C: drive.
<span>C:\$Recycle.Bin
</span>But if you have several drives, there are Recycle Bins each drive.
3 0
3 years ago
Read 2 more answers
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
_________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
sergij07 [2.7K]

Answer:

DOS, Denail of Service Attacks

Explanation:

5 0
2 years ago
i replaced my thermal paste with ketchup and now my pc is getting hot i tried putting my cat in the microwave but it didn't work
ankoles [38]

use your cat's urine instead of ketchup

3 0
3 years ago
Read 2 more answers
Other questions:
  • At an open or uncontrolled intersection, yield if ____.
    11·2 answers
  • Chunking is a good strategy for completing large assignments because it makes the work
    15·1 answer
  • Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and en
    7·1 answer
  • Write an expression that evaluates to true if the value of the string variable s1 is greater than the value of string variable s
    7·1 answer
  • Which of the following is NOT a name of one of the central features of Facebook? Timeline Activity Log Graph Search Daily News
    11·1 answer
  • Which collaboration website is best suited for social collaboration? www.media.iearn.org/projects www.meetup.com www.quest.nasa.
    9·1 answer
  • Which of the following types of cloud platforms would a webmail service offered to the general public be considered?
    9·1 answer
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • What is the most useful advantage of using the Slide Sorter view to rearrange slides instead of using the slide thumbnails in No
    13·1 answer
  • . Write the advantages and disadvantages of CLI?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!