1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
4 years ago
15

A database, a database management system, and the application programs that use the data, make up a database environment.

Computers and Technology
1 answer:
BlackZzzverrR [31]4 years ago
8 0

Answer:

A) The statement is true

You might be interested in
What can be done to improve the security of business uses of the Internet? Give several examples of ecurity measures and technol
igor_vitrenko [27]

Answer Explanation

There are many things to improve the security of business with the help of internet

  • the pillars of business depends upon the information and internet provide security to these information.
  • the computer or laptop which is used for business purpose are secure by internet
  • we use hardware and software firewalls to protect the PC or laptop.
  • we use antivirus to protect the system
  • for runing the computer we uses software firewalls
  • for protection purpose we use hardware firewalls

7 0
4 years ago
Routing in Practice (30 points). For each of the statements below, decide which it is true or false, and briefly justify your an
sergiy2304 [10]

Answer:

a. false

b. true

c. false

Explanation:

a. False, for intra-domain routing distance vector protocol is simple to implement and because all the links have same speed, distance vector routing is better to use. Distance sector routing is simple and least cost-effective than link state routing.

b. True BGP stands for Broader Gateway Protocol and in AS, router uses BGP to decide the best path among multiple possible paths.

c. False, in BGP performance is more important than policy and hence BGP make decision based on shortest path from source to destination while OSPF uses Dijkstra algorithm to decide the shortest path and then works on this policy.

4 0
3 years ago
Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all hosts in all VLANs want to use
tester [92]

Answer:

You need 3 different IP subnets. -- d. 3

Explanation:

The devices in one VLAN are typically in the same IP subnet so you need one subnet for each VLAN.

8 0
3 years ago
In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the protocol to transmit a second frame
irina [24]

Answer:

Using CSMA/CD to avoid collision.

Explanation:

If the channel is detected idle then the station does not transfer the second frame to avoid the collision by design of the CSMA/CD (Carrier sense multiple access / Collision detection). When received the protocol for first frame, a station to send second frame begins at step 2 rather than step1.

Explanation :

• Station A and Station B are transfers data frames, remain all not want to transmit data. In this situation, station A find the channel to be idle and send first frame then next second frame.  

• Similarly B received the transfer data at the same time. Then leads to collision.  

• Using CSMA/CD to avoid collision.

4 0
3 years ago
if you want to present slide to fellow student or co-workers, wich productivity software should you use to create them?
Reika [66]
Microsoft PowerPoint
6 0
3 years ago
Other questions:
  • What is the advantage of defining a target user?
    14·1 answer
  • Part 2: students and courses, part 1  java review you may use an ide or a text editor, but i will test this by compiling and ru
    6·1 answer
  • _______ Originally , the art of maganing engines; in its modern and extended sense
    7·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • Which of the following is categorized as an indirect payment
    9·1 answer
  • What function key is used to enable the spelling and grammar function
    14·1 answer
  • What are the steps to creating a blank database? Use the drop-down menus to complete them.
    9·1 answer
  • Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList v
    13·1 answer
  • Nadia has inserted an image into a Word document and now would like to resize the image to fit the document befter. What is the
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!