1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
8

What is a stored​ procedure?

Computers and Technology
1 answer:
pshichka [43]3 years ago
6 0

Answer:

The right answer is Letter B. It is an area of memory that is used for dynamic memory allocation.

Explanation:

<em>Because a store procedure is not a computer program,neither a computer software . It is a type of code or subroutine available to applications that access a relational database management system. Such procedures are stored in the database data dictionary. It serves to save time and memory, extensive  or complex processing that requires execution of several SQL. </em>

You might be interested in
_____ consists of computer equipment used to perform input, processing, and output activities.
goldfiish [28.3K]
<span> (keyboards, mice, scanning, computer chips)</span>
6 0
3 years ago
The benefits of voice mail include eliminating unnecessary chit chat, telephone tag, inaccurate messages, and a. the need for wr
jonny [76]

Answer:

The correct answer to the following question is option c.) time zone barriers.

Explanation:

When the maximum length of voice mails is set then, the calls that are sent to the voice mail will only recorded up to the that limit. We can also specify the any value from 1 to 60 minutes.

Note: When the voice mails transcription option is enable then, we can specify the any value between from 1 and 2 minutes.

4 0
3 years ago
One of the most basic agricultural tools is the tractor, which is designed to break up the soil in order to prepare it for plant
melisa1 [442]
False because the tractor doesn’t break up the soil
4 0
3 years ago
What process combines data from a list with the content of a document to provide personalized documentsWhat
Morgarella [4.7K]
Mail merge can combine data with the content of a document to make personalized documents.
6 0
3 years ago
Read 2 more answers
What type of attack is dependent on sending packets too large for the server to handle?
Art [367]
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
7 0
3 years ago
Other questions:
  • An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed pro
    10·1 answer
  • Computer hardware without software is useless while computer software without hardware is meaningless. Discuss. Plz provide exam
    15·1 answer
  • 2. The password dilemma refers to the fact that: A. Passwords that are easy for users to remember are also easy for attackers to
    9·1 answer
  • Write 5 things that can be done to avoid computer vision syndrome
    8·2 answers
  • Can a 3048 hp motherboard support a i7 10700k cpu?
    11·2 answers
  • An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
    9·1 answer
  • | HELP PLS! C++ Sorting arrays can be performed using either Selection Sort or Insertion Sort or
    13·1 answer
  • What software can be used for remote operation of a sunsdr2 dx?.
    13·1 answer
  • Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
    10·1 answer
  • Which of the following offers a combination of the features of ram and rom?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!