1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
3 years ago
9

Database users who access data only through application programs are called

Computers and Technology
1 answer:
Alex777 [14]3 years ago
7 0
A. casual users hope this helps
You might be interested in
Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communicati
Vinil7 [7]

Answer: Unified communication

Explanation: Unified communication is the communication technique in which merges various communication routines into a individual business.It works as the phone system which helps in increment of productivity in an organizational business.

The unifying of voice,data/information,video etc is done for optimizing and improving the business that also results in  faster communication rates, secure communication etc.

4 0
3 years ago
What was one important academic skill the blogger learned?
denis23 [38]

An academic skill that the blogger learned, was to review the graded tests and quizzes to see which concepts he missed out on so that in the future he would be well prepared for it. Reviewing and comparing the tests and quizzes would give him an idea on which topics he needs to study.

Other than the academic skill, the blogger also learned that a person should never give up and he keeps on learning throughout his entire life, and that all of the improvements that the blogger made did not come all at once.

4 0
3 years ago
network consisting of computers and other devices that are eithrr fully or partially connected to each other
tekilochka [14]

The answer is a Mesh topology. This method connects every device to each other device in the network. A wired full-mesh topology is not as common as it is impractical and highly expensive. A partial mesh topology offers redundancy if one of the connections goes down and usually uses a connecting medium such as a router to eliminate cables and expensive PCI NIC's.

8 0
2 years ago
A cell reference in a formula allows you to point to another cell location
mario62 [17]

The cell reference refers to a cell on a worksheet and can be used in a formula to point another location.

Explanation:

A cell reference is a range of cells on a worksheet that can be used in a formula to find the values or data you want to calculate using that formula.

There are two types of cell references relative and absolute. they both behave differently when copied to other cells. Relative references change when a formula is copied to another cell.

Absolute reference remains constant even if they are copied. In a formula multiplications are performed before subtraction.

It does not change when the formula is copied or moved to another cell.

6 0
3 years ago
Read 2 more answers
A server needs to connect directly to the Internet. The ipconfig/all command shows that the server has been auto-assigned the IP
Deffense [45]

Answer:

Link-local address

Explanation:

IP addresses that have "FE80" as the hexadecimal representation of their first 10 bits are IPV6 reserved addresses for link-local unicast addressing. These addresses are automatically configured (though may be manually configured too) on any interface and should not be routed. They are used for addressing on a single link with the main aim, among others, of automatic configuration and routing protocol advertisement. Devices attached to this link can be accessed or reached using the link-local addresses as they don't need a global address to communicate.

However, routers will not forward datagram or packets using link-local addresses. In other words, routers are not allowed to connect to the internet using the unicast link-local addresses.

8 0
2 years ago
Other questions:
  • Question 4 (2 points)
    6·2 answers
  • Given that the variables x and y have already been declared and assigned values, write an expression that evaluates to true if x
    15·1 answer
  • What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowle
    14·1 answer
  • What is the specifications, number of sales, positive and negative points and a few popular games of the first PlayStation?
    13·1 answer
  • What word describes a violation of copyright laws? What rights do copyright holders have over their work of art
    5·2 answers
  • What are the advantages to using a linked implementation as opposed to an array implementation?
    8·1 answer
  • What is one reason why a business may want to move entirely online?
    12·1 answer
  • Anyone from qls<br><br>or grax here<br><br>in bs​
    13·1 answer
  • Example of Bandwidth Analogies: using Pipe
    11·2 answers
  • The higher the ____________________, the faster the ____________________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!