1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
8

What is the name of a statement written to retrieve specific data from a table?

Computers and Technology
1 answer:
Shkiper50 [21]3 years ago
4 0
The answer is b.record
You might be interested in
Technology deals with...
aivan3 [116]

Answer:

<em>C</em>

Explanation:

technology deals with the use of computers in school and work

4 0
3 years ago
In a brief essay explain the security vulnerabilities of transition methods (6to4, etc.)
vlabodo [156]

Answer:

While transiting from IPv4  to IPv6, many offices and companies use both the protocols (Ipv4 and IPv6) at the same time. This scenario can increase the risk  rate of attack twice. All the flaws and vulnerabilities could be overlooked easily when transition is done.

On the other hand, while transiting Ipv6 to IPv4, the router does not tells or depicts that the communication is appropriate or if it could be used as a part of DoS attack that make it so much harder to trace the origin back.

The reason for the vulnerability of Transport Relay Translators (TRT) is that they do not apply Internet Protocol Security (IPSec) and thats why they are not secure.

i hope it will help you!

7 0
4 years ago
I’m buying a prebuilt pc once I get it and set it up, what do I need to install on it?
jarptica [38.1K]
First thing you want to install are the drivers for your GPU and CPU if they aren’t automatically installed. Just search the specific GPU or CPU and download them from the company websites. You can see your CPU and GPU by opening System Configuration or System. You also want to install the latest Windows defender updates as well as Windows updates. Once you have these completed, you should be all set. If anyone wants to add anything specific, feel free to comment below.
7 0
3 years ago
Before sending a packet into a datagram network, the source must determine all the links that packet will traverse between sourc
Llana [10]

Answer:

False

Explanation:

The transport layer is found in both OSI and TCP/IP suite model. It segments and propagates packets across a network. TCP and UDP are protocols in this layer.

UDP is a connectionless protocol, that is to say, it needs no connection for transmission to take place. UDP transfer is unreliable as packets lost are not retransmitted. Unlike the TCP, it's header is smaller and it is faster in transmission, and links to destinations are random and not determined by the source.

3 0
3 years ago
Processor speed is a measurement of what?
Korolek [52]

Aloha~! My name is Zalgo and I am here to help you out on this amazing day. The answer you are looking for is "In a computer system, the clock speed refers to the number of pulses per second generated by an 'oscillator' that will set the tempo for the processor. Clock speed is usually measured in MHz (MHz stands for megahertz, or millions of pulses per second) or GHz (gigahertz, or billions of pulses per second).

I hope that this answer helped you! :D

"Stay Brainly and stay proud!" - Zalgo

(By the way, do you think you could mark me as Brainliest? I'd really appreciate it! Thank you~! XP)

5 0
3 years ago
Read 2 more answers
Other questions:
  • To add artwork to a slide, the slide must contain a placeholder. <br> a. True <br> b. False
    10·1 answer
  • Given the following function definition, what modifications need to be made to the search function so that it finds all occurren
    7·1 answer
  • After you save a table, the new table name appears ____.
    12·2 answers
  • Your IT manager wants you to set up three computers to appear to users as one powerful Windows Server 2016 server. What capabili
    14·1 answer
  • Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
    13·1 answer
  • What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B
    8·1 answer
  • Distinguish between secondary storage device and primary storage device
    7·1 answer
  • Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc
    12·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • Let's say you are a UX researcher working on the design of a major social media application, let's call it QuickTalk. QuickTalk
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!