1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
3 years ago
10

Which command backs up the single database called 'websites' to the file 'websites_backup.sql'?

Computers and Technology
1 answer:
kaheart [24]3 years ago
8 0

Answer:

(d) mysqldump websites -u root -p > websites_backup.sql

Explanation:

To create a backup mysqldump is used.It is a data backup program.This program was originally written by Igor Romanenko. It creates a backup of file name websites_backup.sql.

So among the given options in the question option d is the correct option which backs up the single database websites in the file website_backup.sql.

You might be interested in
Next
DIA [1.3K]

Answer:

integrity

is acting consistently according to one's values and principles.

3 0
2 years ago
g Q 2 Suppose I need a data structure having the following characteristics: a) must be very space efficient, and b) I have a goo
SIZIF [17.4K]

Explanation:

a.I would choose an advanced data structure like  dispersion tables.

Scatter tables, better known as hash tables, are one of the most frequently used data structures. To get an initial idea, scatter tables make it possible to have a structure that relates a key to a value, such as a dictionary. Internally, the scatter tables are an array. Each of the array positions can contain none, one or more dictionary entries.

It will normally contain a maximum of one, which allows quick access to the elements, avoiding a search in most cases. To know at which position in the array to search or insert a key, a scatter function is used. A scatter function relates each key to an integer value. Two equal keys must have the same dispersion value, also called a hash value, but two different keys can have the same dispersion value, which would cause a collision.

B. If I eliminated the characteristic b, a possible candidate keeping the previous characteristics would be: Balanced binary trees

Balanced binary trees are data structures that store key-data pairs, in an orderly way according to the keys, and allow quick access to the data, given a particular key, and to go through all the elements in order.

They are appropriate for large amounts of information and have less overhead than a scatter table, although the access time is of greater computational complexity.

Although the storage form has a tree structure internally, this is not externalized in the API, making the handling of the data transparent. They are called balanced because, each time they are modified, the branches are rebalanced in such a way that the height of the tree is as low as possible, thus shortening the average time of access to the data.

5 0
3 years ago
What is computer specification
iren2701 [21]

Answer:

Computer hardware specifications are technical descriptions of the computer's components and capabilities. Processor speed, model and manufacturer. Processor speed is typically indicated in gigahertz (GHz). The higher the number, the faster the computer.

8 0
3 years ago
Why is the choice of form factor critical when building a computer from scratch?
faltersainse [42]
More features/more space makes things easier to work on and cool down
6 0
3 years ago
According to the government, employees have a right to understand the risks associated with the materials they work with.
Alex
True. They require a MSDS (Material Safety Data Sheet) for each chemical that a business receives.
3 0
3 years ago
Other questions:
  • The purpose of the img element's ________ attribute is to provide a method for a browser to display different images depending o
    7·1 answer
  • Two advantages of Internet are ?​
    7·2 answers
  • An ink-jet printer is a type of impact printer. <br> a. True <br> b. False
    8·1 answer
  • is an interviewing method in which a mall interviewer intercepts and directs willing respondents to nearby computers where each
    7·1 answer
  • Please help! 40 points + Brainliest!
    8·1 answer
  • Será que me podrían ayudar pasandome los códigos por favor
    13·1 answer
  • Which topology connects multiple star-topology networks using a bus topology?
    6·1 answer
  • HELP WILL GIVE BRAINLIEST !!!!!
    6·1 answer
  • Write a C++ line of code to declare a variable of type “double” that signifies the average of student grades, then initialize th
    6·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!