Answer:
host-based security measures
Explanation:
Anti-virus, host-based firewall, system hardening, change control, and log management are host based.
Answer:
net use X: \\SERVER\Share
Explanation:
1. Connect securely to the remote computer or ensure you have access to it on the network
2. then follow the step below:
Where X: is the drive letter you wish to map the share to, and \\SERVER\Share is the UNC path to the share. This should make the share visible in My Computer and the command line as well like all other shares mapped through the GUI.
In order to later disconnect the share, you would use
net use X: /delete
This question should be in physics so this is my answer in C&T format-go to a online shop and order one or the pieces then follow the instructions that will be given.
C. Insert
Insert will let you inseet different things into your presentation.
Answer:
View Base tables: Virtual table based on a SELECT query
CREATE VIEW statement: Data definition command that stores the query specification in the data dictionary
DROP VIEW statement: Data definition command that removes the query specification in the data dictionary
Explanation:
Views are virtual tables, which can be created by select queries using the real database tables.
Creating and dropping views can be done by the CREATE VIEW and DROP VIEW statements.
<u>CREATE VIEW syntax:</u>
CREATE VIEW view_name AS
SELECT column1, column2, ...
FROM table_name
WHERE condition;
<u>DROP VIEW syntax:</u>
DROP VIEW view_name;