1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aev [14]
3 years ago
5

In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy

is
Computers and Technology
1 answer:
cluponka [151]3 years ago
4 0
In the context of the database design process, the conceptual design step that defines the  fragmentation and allocation strategy is the database design flashcards. The distributed data base design problem is presented that involve a development of a global model ; a fragmentation and a  data allocation.
You might be interested in
list the authours who explained communication, pros and cos, importance of communication and the types of of communication and t
atroni [7]

Answer: the answer is A.

Explanation: hope this helps!

3 0
2 years ago
When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
miv72 [106K]

Answer:

recognition

Explanation:

<h2><u>Fill in the blanks</u></h2>

When you take a multiple-choice test, you are relying on <u>recognition</u> , a means of retrieving information out of your long-term memory storage system that helps you choose the correct answer.

4 0
3 years ago
Which feature is needed to make enterprise application migrate to private cloud ?
den301095 [7]

The answer is C: Enablement of application as SaaS.

A cloud can provide IT infrastructure network services like storage and servers. Once an application has been identified as a potential candidate for cloud migration, it is important to consider what type of cloud environment; PaaS, SaaS, or IaaS. In this case, SaaS will be considered. SaaS host business application and makes them available to clients online. It removes the need for enterprises to run applications on their own.

8 0
3 years ago
Read 2 more answers
Please answer this question correctly​
Zigmanuir [339]

Answer:

i cant answer this im sorry

7 0
3 years ago
What kind of job is NOT at greater risk for workplace violence?
natta225 [31]
Well this isnt a computer and technology question ut ill still answer it... youve got being an IT person, Working at build- a-bear, laundry mat, babysitter, there is many different ones
4 0
4 years ago
Other questions:
  • One disadvantage of using the styles feature of a word processor is that you cannot modify existing styles. true or false
    14·1 answer
  • By default, table headers will include the arrows shown in the table. What menu option(s) are available when this arrow is click
    8·2 answers
  • If you hear that an airplane crashes into the Empire State Building, and you immediately think of the 9/11 terrorist attack on t
    9·1 answer
  • What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
    11·1 answer
  • Why is flash memory considered nonvolatile?
    5·1 answer
  • This uses the gps methodology to predict the likely location of an offender's base of operation:
    8·1 answer
  • Ba esti prost?<br> Ba esti nebun?<br> Ce ai?
    5·2 answers
  • You would like to narrow your search on this topic.
    15·2 answers
  • Write the code to create a variable score and assign it the value 0?​
    6·1 answer
  • When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!