1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NNADVOKAT [17]
3 years ago
10

What is meant by the term drill down?

Computers and Technology
1 answer:
andrezito [222]3 years ago
7 0

Answer:

 The drill down term is basically used in the information technology for the explore the multidimensional information or data by navigating the different layers of the data from the web page applications.  

Drill down basically involve in the database by accessing the specific information through the database queries. Each query basically increase the data granularity. This term is also involve with the link for represent the details more specifically.

The drill down is the simple approach or technique for dividing the complex problems into small parts so that it make the technique more efficient.

You might be interested in
To find out how much ram is installed on a machine, in windows go to the user: a power ______ is a part inside a computer case t
shusha [124]
<span>a power _supply_ is a part inside a computer case that supplies power to the motherboard and other devices that are installed user: when a hard drive is first recognized by windows, it is assigned the _basic_ disk status user: utilize a _64_-bit os if you are looking for increased performance and you have a system that can support it.</span>
4 0
2 years ago
Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-fac
Katen [24]

Answer:

Option (C) is the correct answer of this question.

Explanation:

Smart card is the security administrator wishes to implement two-factor authentication to improve security.Normally this data is affiliated with either meaning, information, or both, and will be stored and transmitted within the chip of the card.A smart card, usually a Chip Card type.

  • It is a flexible card that holds an integral computer chip that preserves and sends a signal data, either database or semiconductor form.
  • Used for controlling access to a resource.
  • Data authentication, encryption, cloud storage, and software processing can be established by smart cards.

Other options are incorrect.

4 0
3 years ago
When a support agent does not know the answer to a question, a good incident management strategy is to tell the user ____.
laiz [17]

When you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her.

<h3>What is incident management?</h3>

Incident management can be defined as a strategic process through which a business organization or company identifies, analyzes, and correct hazards, so as to ensure that normal service operation is restored as quickly as possible to end users after a disruption, as well as to prevent a re-occurrence of these hazards in the future.

As a support agent, if you don't know the answer to a question, a good incident management strategy is to tell the user that you'll research the question and get back to him or her at a latter time.

Read more on incident management here: brainly.com/question/11595883

4 0
2 years ago
is there a way to send files from my PC to my iPhone? My PC’s wifi receptors are broken so it cannot connect to wifi. Is there a
Alex_Xolod [135]

Answer:

I believe you need a internet connection for that or try a Hotspot that can work too.

5 0
3 years ago
The ability of a language to let a programmer develop a program on computer system that can be run on other systems is called
kakasveta [241]
It is called 'portability'.
6 0
3 years ago
Other questions:
  • The project started the development of inter-network connections using tcp/ip that has evolved into the internet today.
    5·1 answer
  • What is your understanding of the difference between a stream cipher and a block cipher?
    14·1 answer
  • Which one of these do not belong on the Do's list in Helpful Hints when preparing a presentation: Which one of these do not belo
    8·1 answer
  • Order the steps to take when drawing electron dot diagrams.
    15·2 answers
  • You can use pen and highlighter tools to emphasize information on a slide during a PowerPoint presentation. These tools are avai
    11·1 answer
  • The user does not need to highlight data within an Excel worksheet in order to remove conditional formatting. True or false
    14·1 answer
  • I need a good science fair name I’m doing a homemade water filter and I have no idea what the title should be plz help
    14·1 answer
  • What constructs break or bend the normal Syntax patterns of scheme?
    15·1 answer
  • PLZZZZ help will give brainlest
    5·1 answer
  • The _____ layer addresses how the software will execute on specific computers and networks.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!