1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
12

In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storag

e cost, and security are key considerations.
True / False.
Computers and Technology
1 answer:
natita [175]3 years ago
3 0

In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storage cost, and security are key considerations is True.

True

<u>Explanation:</u>

If database is centralized (DBMS) as database administrator has kept database server on by 24 X 7. If an organization office is spread over many countries, centralized the database is good advice.

Database administration has monitored the database access in and out transaction on the database.

Since it is centralized database, it is cost effective rather providing database server in office in organizations  and later it synching  to centralized database on period schedule or end user ( IT department)  in each office has to execute the period schedule then their requirements

Response time from and to on centralized database is count how fast the system operates the database.

Since it is database is centralized storage cost is reduces as expenses in the organization.

Security on centralize database server is very important to protect from hackers.

You might be interested in
What is the difference between simple and complex waveforms?
Nataliya [291]
Simple waveform - something like a sine wave. Very pure sound like you used to get on the tv when that girl was sitting with the toys in the middle of the night. Complex waveform is like speech etc
5 0
3 years ago
You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
Temka [501]

Answer:

The answer is (B) Maximum password age.

Explanation:

To prevent several changing of passwords by a user in a day, the maximum times a password can be rest within a day is normally set by  the system administrator.

The setting ensures the password is returned to the current settings of the password on the system for the user and prevents unnecessary changing of passwords in a day by user.

6 0
3 years ago
Read 2 more answers
When there are items that are out of the control of the programmer that may support or oppose the program goals, this is termed
netineya [11]

Answer:

Option D (External influences) is the correct choice.

Explanation:

  • External factors including certain regulatory changes, the economy, globalization as well as new technologies may determine the effectiveness of such smaller businesses.
  • They are the be the variables that may be out of a corporation's influence. While a company has no power regarding external factors, these factors may have a direct effect on the company.

Other given choices are not related to the given circumstances. So that option D would be the right one.

3 0
3 years ago
how do you define technological world is a easier way for this low iq girl to understand its for my essay pls help me im about t
Gelneren [198K]
A world that uses technology.
5 0
3 years ago
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
ycow [4]

Answer:

Promiscuous mode

Explanation:

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…

✓ Promiscuous mode

7 0
2 years ago
Other questions:
  • My computer have black spots and line
    7·2 answers
  • The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
    8·1 answer
  • An example of creative curating is when a:
    9·1 answer
  • What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
    10·2 answers
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • What key value does Accenture’s myConcerto bring to clients looking for automated solutions?
    6·1 answer
  • Which terms represent the two types of client requirements?
    7·2 answers
  • Ssssssssssssssssssssssssssssssssssssssssssssssssss 100 points for this answer too.
    10·1 answer
  • The process of arranging the item of a column in some sequence or order is known as?
    12·1 answer
  • Why does Homework exist? Why is it so important?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!