1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
14

Please I need all the help I can get Thank You So Much

Computers and Technology
1 answer:
Katen [24]3 years ago
7 0

1-A database is an organized collection of data, generally stored and accessed electronically from a computer system (2 choice)

2 - All of the above

3-record

4- B i think

I hope this helped. :D

You might be interested in
In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix
Tcecarenko [31]

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

4 0
3 years ago
Which type of financial institution typically has membership requirements?
dedylja [7]
I would say at least banks and credit unions.Membership requirements could include such things as having significant assets to open a certain type of account, having accounts in other branches, being willing to have a certain prescribed amount of membership shares such as at some credit unions.
4 0
3 years ago
listen to exam instructions a small business called widgets, inc. has hired you to evaluate their wireless network security prac
Alex

Following actions could you most likely advise the client taking to strengthen the security of their wireless network-

  • Change the default SSID to anything different.
  • Turn off SSID broadcasting.
<h3>Explain the term wireless network security?</h3>
  • Designing, putting into practice, and ensuring security on such a wireless computer network are all parts of wireless network security.
  • A wireless computer network is further protected by this subset of network security.
  • Wireless security is another name for wireless network security.

For the stated question-

  • Disabling SSID broadcast and changing the network name are advised.
  • By disabling SSID, the network name won't be displayed on devices looking for a network can connect to, and so by changing the name, it will be impossible for anyone who already knows the old name to connect.
  • Both of which significantly boost security.

To know more about the wireless network security, here

brainly.com/question/28257213

#SPJ4

3 0
1 year ago
Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
KatRina [158]
The recommendation of the instructor for Gaven to include a personal statement in his work portfolio will allow him to identify his career goals. If he is unable to show this to his work portfolio then he may simply state it in the personal statement. Thus, the answer to this item is letter A. 
6 0
3 years ago
The         provides access to the Internet; may also be internal
grin007 [14]
The TCP/IP protocol provides access to internally and externally I.e. The internet.
3 0
3 years ago
Other questions:
  • The ____ function displays the highest value in a range.
    15·2 answers
  • If you wanted to create a graph that showed how much each value contributed to the whole value, you would use a _____.
    15·2 answers
  • The approved systems design document is used by programmers, the personnel department, and information systems personnel.
    8·1 answer
  • HTTP is the protocol that governs communications between web servers and web clients (i.e. browsers). Part of the protocol inclu
    5·1 answer
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • Which of the following is not true about search engine advertising?
    15·1 answer
  • Which of these consoles have 64 bit architecture
    13·1 answer
  • In what way do networks help to protect data
    6·1 answer
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!