1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
6

A type of file format to compress files and images allowing them to be stored with less disk space

Computers and Technology
1 answer:
solniwko [45]3 years ago
5 0
Zip ..........................................
You might be interested in
Describe how to deploy a website and make it as secure as possible while reducing its resources used
erastova [34]

Answer:

Explanation:

in order to deploy a website, you use these 5 steps, the first step is the preparation step, the second step is to set up DNS record, in step 3 a live testing is set up, in step 4 you set up email accounts while in step 5, you back up and now go live.

in order to secure your website from any threat, malware it hacker it it is necessary to use HTTPS. HTTPS, protects the websites integrity. it also provides data protection as data encryption provides such security. parameterized queries can also be used.

5 0
3 years ago
Peter Chen developed ERDs in 1976. Since then Charles Bachman and James Martin have added some slight refinements to the basic E
shusha [124]

Answer:

Check the explanation

Explanation:

In RDBMS relational database, the keys play an essential role in making the database reliable and relational in which two or more relations (tables) can be divided into a range of relations with the use of diverse types of keys due to which the redundancy decreases and flexibility of data storage increases.

The following are the usage of keys in a database:

   It helps in identifying a specific record that is present in the table.

   It is used in minimizing the redundancy from the tables.

   It is used in removing the multi-valued attributes from the relations.

   it helps in connecting one table with others by using Foreign keys.

   It is used in maintaining the uniqueness of the data stored in the database.

   It helps in identifying the relationship between two or more tables.

Types of keys in a relational database:

   PRIMARY KEY: It helps in identifying each record uniquely due to which the redundancy of data can be minimized.

   FOREIGN KEY: It is a kind of referenced key that helps in making a relationship between two or more tables. It helps in fetching records by combining two or more tables with the help of different joins.

   SUPER KEY: It is a combination of two or more keys that can be selected as primary. It may contain those columns which have repeated values.

   COMPOUND KEY: It is a combination of those columns which may not be used independently as the identification of unique records but their combination does.

   CANDIDATE KEY: It is a kind of a super key that does not contain repeated records. A primary key can be chosen from candidate keys.

8 0
4 years ago
which of the following is required to establish a new network switch and configure its IP address for the first time
dlinn [17]

Out-of-band management is required to establish a new network switch and configure its IP address for the first time.

<h3>What is Out-of-Band management?</h3>

Out-of-Band management is known to be a form of services that makes sure that a tech do not require to be sent onsite and it is one where remediation can be done in a remote place.

Hence,  Out-of-band management is required to establish a new network switch and configure its IP address for the first time.

See full question below

Which of the following is required to establish a new network switch and configure its IP address for the first time?

A. Client-to-site VPN

B. Site-to-site VPN

C. Out-of-band management

D. In-band management

Learn more about IP address from

brainly.com/question/24930846

#SPJ1

6 0
2 years ago
38. Which of the following best describes why e-mail spoofing is easily executed? a. SMTP lacks an adequate authentication mecha
olga55 [171]

Answer:

The correct answer to the following question will be Option A (SMTP lacks an adequate authentication mechanism).

Explanation:

Email spoofing seems to be the manufacture of such a header throughout the expectation that the receiver would be duped into believing the email came from others that is more than just the anticipated source.

  • It is likely since the SMTP doesn't have an authorization method for either the address.
  • While parameters and frameworks for combating email spoofing have already been established for authentication, implementation of those frameworks seems to have been late.
8 0
4 years ago
You can restore a deleted layer during the current editing session by deleting the _____ state on the history panel.
bulgar [2K]
You can restore a deleted layer during the current editing session by deleting the Delete Layer <span>state on the History palette.</span>
7 0
3 years ago
Other questions:
  • Knowledge flows from the information that has been generated. Which of the following does not necessarily flow from information
    15·1 answer
  • To change the print orientation from portrait to landscape, tap or click the ____ button on the print preview tab.
    15·1 answer
  • How does social media affect communication skills negatively?
    9·1 answer
  • After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory l
    5·1 answer
  • What inspired john logie baird to create the television?
    11·1 answer
  • A tracking signal A. is computed as the mean absolute deviation​ (MAD) divided by the running sum of the forecast errors​ (RSFE)
    10·1 answer
  • Write an application that allows a user to enter any number of student quiz scores, as integers, until the user enters 99. If th
    5·1 answer
  • What is motherboard ?​
    7·1 answer
  • Explain what led to the invention of lasers
    7·1 answer
  • Identify two different uses/applications of data in which biases in word embeddings might cause significant ethical harms, then
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!