1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gavmur [86]
3 years ago
11

Which database item would show details such as a customer’s name, their last purchase, and other details about a customer?

Computers and Technology
2 answers:
Anastasy [175]3 years ago
7 0
The correct answer is record.
elixir [45]3 years ago
5 0
C- Record.
Hope this helps!
You might be interested in
Running the Disk Cleanup utility is a quick way to ________. Group of answer choices defrag your hard drive remove spyware progr
grigory [225]

Answer:

Clear out any garbage file on the drive

Explanation:

7 0
3 years ago
PLEZ ANSWER QUICK
harina [27]
The answer is URL. ........
7 0
3 years ago
Read 2 more answers
Please help i only have 20 minuets
Ann [662]

Answer:

Newton's first law states that an object will stay at rest or be in motion, unless an unbalanced force acts on it.

7 0
3 years ago
​in older systems, often the user interface mainly consisted of _____ screens that allowed a user to send commands to the system
inessss [21]

Typically, in older systems, the GUI would be Text Based

7 0
3 years ago
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Other questions:
  • which resource do programmers sometimes have to refer to and use during planning the logical steps of the solution
    15·2 answers
  • The main difference between a lan, a man, and a wan is _____. the ability to connect to the internet the geographic area they co
    8·1 answer
  • Ron is in the process of designing tables for a database that will contain information for all school matches played in a year.
    6·1 answer
  • What is website and what are the difference between website and blog pls anyone​
    6·2 answers
  • I NEED HELP ASAP!!!!!! IM IN THE MIDDLE OF A QUIZ!!!! Why did the film industry agree to set standards for film production?
    11·1 answer
  • What is difference between computer and smartphone
    15·1 answer
  • How can a user remove or delete a Pivot Table?
    8·1 answer
  • What is the difference between a threat and an attack?
    7·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    15·1 answer
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!