1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrey2020 [161]
3 years ago
14

Describe five different ways databases can be processed

Computers and Technology
1 answer:
Tresset [83]3 years ago
6 0
The five different ways databases can be processed are :
1) Queries, Forms and Reports
2) Application Programs
3) Stored Procedures
4) Triggers
5) Web Applications
You might be interested in
A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu
Mama L [17]

Answer:

Replace the printhead is the correct answer.

Explanation:

Because in the following statement, that person is from the department of the accounting then, he call the technician regarding the problem occurs in the printer which is dot-matrix printer and when he examined the dot-matrix printer and replace the printhead because when he print any document then, he finds that some letters have missing from the page.

5 0
3 years ago
What protocol suite below is the most commonly used protocol for local area network (lan) communication?
grandymaker [24]
Answer TCP/IP is the most common protocol in Local Area Networks.
3 0
3 years ago
You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM
elixir [45]

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

7 0
3 years ago
Knowledge management software helps companies preserve the knowledge gained through the use of information so that future users
V125BC [204]

Answer:True

Explanation:

Knowledge Management (KM) software is software that assists with the identification, creation, distribution, and organization of a company’s knowledge pool. KM software, at its best, gives a company a single, unified pool of information that is easily

(1) accessible

(2) discoverable

(3) updated

KM software is meant to make companies leaner, efficient, and more profitable. But a number of challenges exist which make that easier said than done. Let’s look at a few of the primary challenges that make KM software so important for businesses—but so difficult to get right.

8 0
3 years ago
Read 2 more answers
You want to discard your old computer and want to securely erase the data from your hard drive. What program can you use to do t
shtirl [24]

one thing you could do is a factory reset, but that depends on your system

5 0
3 years ago
Other questions:
  • What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
    13·1 answer
  • What is the purpose of a scatter plot introduction to computer applications
    6·2 answers
  • The feedforward part of the conversation should do all of the following except __________.a.identify the toneb.introduce the pur
    11·1 answer
  • In addition to key executives, there are other positions in a company that may be considered critical, or whose loss will be dif
    5·1 answer
  • Explain briefly why the discovery phase is a favorite with many developers
    5·1 answer
  • Which command is not one of the available Change Case options?
    8·1 answer
  • Write a for loop that runs 5 times and accepts the input of an integer number every time. Those numbers will be accumulated by a
    7·1 answer
  • Which is the purpose of adding B-Roll footage to a sequence?
    10·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • What is the output of the code? (CHECK IMAGE)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!