1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
3 years ago
5

If all the data in a database is not physically located in one place, it would be a(n _______ database.

Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
8 0
Distributed. Distributing data has some advantages and disadvantages. Mostly it brings you performance, because you can spread the work over multiple nodes, and connect to nearby nodes. If you fully replicate the data your system becomes redundant; one node can break and you don't lose anything.

The price to pay is the overhead in keeping multiple locations in sync.
You might be interested in
Do u have to divide or multiply this problem 5300 yd = mi
Alona [7]

Answer:

the answers is 3.011364 and if you need to roundnit would be 3.01

6 0
3 years ago
There are a number of classifications that can be applied to security controls.
kodGreya [7K]

Answer:

Preventive control is not a classification that can be applied to security controls.

Explanation:

At the most basic level, we should protect resources and assets that are of value to an organization by mitigating the risk to those assets and resources. Security controls include any type of policy, technique, procedure, or solution that help mitigate risks. There are models that define security control objectives and are classified by control type and by function

By Control Type

  1. Physical control: Anything that can be touched and can be used to detect and prevent unauthorized access from adversaries and threat actors. Examples include CCTV, electric fences, Biometrics
  2. Technical controls: Examples include firewalls, AMSI solutions, IDSs and IPSs that help protect an organization’s resources and assets. They can be both hardware and software solutions.
  3. Administrative controls: These are the overall design of the protocols or guidelines that define business needs based upon the organization’s security goals that help implement a secure environment. Things like staff awareness and training are among the examples of administrative controls.

Learn more about Security Control classification

brainly.com/question/13239384

brainly.com/question/14409331

#LearnWithBrainly

5 0
4 years ago
You can use a(n) ____ to visually separate related controls from other controls on the form.
maksim [4K]

Answer:

The correct answer to the following question will be Group Box.

Explanation:

Group Box:

  • A type container that contains many types of controls that are usually related to each other in the form.
  • It usually provides the identified grouping for other controls.
  • used for the subdivision of the forms.
  • Separation of the controls can be done with the help of grouping by group box.

5 0
3 years ago
JAVA When simply determining the order of magnitude of an algorithm using Big-Oh algorithm analysis, an instruction that evaluat
OlgaM077 [116]

Answer:

True.

Explanation:

When determining the order of magnitude of an algorithm using the Big-Oh algorithm analysis.The instruction which evaluates to O(c) is equal to one that is O(1) because it is considered as constant time and to represent constant we use O(1) in  big-Oh notation.

Hence the answer to this question is True.

7 0
3 years ago
The duties of a database administrator include determining which people have access to what kinds of data in the database; these
fomenos

Answer:

Processing Rights.

Explanation:

The duties of a database administrator include determining which people have access to what kinds of data in the database; these are referred to as processing rights. There are other kind of rights too that will be decided by the Database Administrator. The database administrator grants access to different people depending on the usages of the database. There can be different types of data in the database. These are called the Processing rights.

7 0
3 years ago
Read 2 more answers
Other questions:
  • A step commonly used for Internet vulnerability assessment includes __________, which occurs when the penetration test engine is
    9·1 answer
  • An important piece of a project is past due date.
    9·2 answers
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • Which of the following actions would help people determine their interests?
    11·1 answer
  • Which is the value that expressions within conditional statements return?
    12·1 answer
  • Karen thinks she should go out with Blane, an unattractive, social misfit, because “If I don’t go out with him, people will thin
    7·1 answer
  • which of the following is not a windows accessory? a. sticky notes b. windows 8 c. sound recorder or d. paint
    8·2 answers
  • The Matlab Script should:1. Clear the command window2. Clear the workspaceQuestion 1: Why do we clear the command window and wor
    9·1 answer
  • How do I change my PATH?
    7·2 answers
  • T<br> N<br> O<br> ?<br> You can insert only the row<br> only to<br> True or false
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!