1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
4 years ago
13

Subscribe to (Thicc sickqueen) and like 2 vids and the claim your prize

Computers and Technology
1 answer:
lara [203]4 years ago
5 0

Answer:

done

Explanation:

You might be interested in
______ is used to extract knowledge from sources of data-NoSQL databases, Hadoop data stores, and data warehouses-to provide dec
Alex777 [14]

Answer: Data analytics

Explanation:

3 0
2 years ago
____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
elixir [45]

Answer:

The correct answer to the following question will be Vendor Lock-In.

Explanation:

Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.

Some ways to avoid Vendor Lock-In, these are as follows:

  • Design your application portable.
  • Keep watching vendor contracts.
  • Arrange both entry and exit with your vendor.

8 0
3 years ago
List 100 social media with functions​
olga55 [171]

Answer:

J

Explanation:

6 0
3 years ago
Which of the following is not a benefit of normalization?
mixer [17]

Answer:

The answer is option (4) Maximize redundancy as normalization minimizes redundancy of data.

Explanation:

Normalization of databases leads to minimization of data redundancy in databases. It doesn't maximize data redundancy. Data redundancy leads to wastage of resources. Normalization of databases minimizes insertion anomolies. Normalization of databases minimizes deletion anomolies. Normalization of databases minimizes updation anomolies.  So , the answer to the question is option (4) maximize redundancy.

8 0
3 years ago
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
ycow [4]

Answer:

Promiscuous mode

Explanation:

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…

✓ Promiscuous mode

7 0
3 years ago
Other questions:
  • Name a computer programme that designers are likely to use to create a leaflet advertising their new product
    15·1 answer
  • How can people make sure they are using credit cards responsibly
    14·2 answers
  • What symbol following a menu command lets you know that a dialog box will be displayed? an arrow a check mark an ellipse a radio
    5·2 answers
  • If there is a mistake with one of your bank accounts, who should you contact to resolve the issue
    14·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • Fact about energy that will make a knex car move
    7·2 answers
  • List any two different between primary memory and secondary memory.​
    8·2 answers
  • The blue section of the following Venn diagram could represent which of the following Boolean statements?
    14·1 answer
  • What is the value of the variable named result after the following code executes?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!