1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Over [174]
4 years ago
9

Database users who access data only through application programs are called

Computers and Technology
1 answer:
Alex777 [14]4 years ago
7 0
A. casual users hope this helps
You might be interested in
A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital ne
barxatty [35]

myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.

Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.

These Advisors are  known worldwide community of technical resources. They have a thorough  knowledge of cloud technologies and practices.

Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.

Learn more from

brainly.com/question/24918185

3 0
3 years ago
Full form of DVX please answer fast ​
statuscvo [17]

Answer:

Devastating Vocal Xcellence

Explanation:

5 0
3 years ago
Jack was shocked to witness the sudden drop in performance of his laptop. He also found that the screen saver constant changed a
djyliett [7]

Answer: bootkit

This is the answer because the hacker was not trying to get any private information, so a bootkit would be the correct answer. A bookit uses a program to basically destroy your computer from the inside, starting from the motherboard.

Hope this helps!

8 0
3 years ago
Consider a router that interconnects three subnets: subnet 1, subnet 2, and subnet 3. suppose all of the interfaces in each of t
creativ13 [48]

Answer:

thank God for us you and keep hoping tougher than I thought it would be

4 0
3 years ago
Read 2 more answers
Why did my typing suddenly become delayed, but then went back to normal a few minutes later. Is this spyware or smth?
Murljashka [212]

Answer:

Socratic app

Explanation:

it will help you

7 0
3 years ago
Other questions:
  • You can deselect multiple selected sheets beginning with the sheet1 tab by pressing the ____ key and clicking the sheet1 tab.
    15·1 answer
  • A presentation to sixth graders always should be more abstract than a presentation to corporate executives?
    12·2 answers
  • What is information reach? A. A global public network of computer networks that pass information from one to another using commo
    5·1 answer
  • What are the advantages of a diverse workforce? Select all that apply.
    6·2 answers
  • I have six nuts and six bolts. Exactly one nut goes with each bolt. The nuts are all different sizes, but it’s hard to compare t
    12·1 answer
  • You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses o
    9·1 answer
  • A_____ handles all the instructions that it received from hardware and software which are available on the computer ​
    10·1 answer
  • Every presentation should have a beginning, a middle, and an end.
    10·1 answer
  • You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
    14·1 answer
  • What is text or pictures behind the document called?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!