1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
14

What are Important points to include about preventing the download of malware?

Computers and Technology
1 answer:
Natasha2012 [34]3 years ago
7 0

Check if it’s a viable site, the browser will usually warn you if the site or file as to what you’re downloading from is dangerous.

You might be interested in
To gain one pound of fat, how many extra calories would you need to consume?
mamaluj [8]
You'll need $3,500 extra calories to gain one pound of fat.

6 0
3 years ago
8. SQL, Oracle Report, and Visual Basic are all examples under the
sleet_krkn [62]

SQL, Oracle Report, and Visual Basic are all examples under the generation.

<h3>Fourth generation languages</h3>

Fourth-generation programming language (4GL) are computer programming language based on the advancement on third-generation programming languages (3GL).

4GLs may include support for <em>database management, report generation, mathematical optimization, GUI development, web development.</em>

SQL, Oracle Report, and Visual Basic are all examples under the generation.

Find out more on Fourth generation languages at: brainly.com/question/9325849

3 0
2 years ago
The graphical user interface (GUI) was pioneered in the mid-1970s by researchers at:
olasank [31]
IBM is the correct answer
5 0
3 years ago
Read 2 more answers
Peter Chen developed ERDs in 1976. Since then Charles Bachman and James Martin have added some slight refinements to the basic E
shusha [124]

Answer:

Check the explanation

Explanation:

In RDBMS relational database, the keys play an essential role in making the database reliable and relational in which two or more relations (tables) can be divided into a range of relations with the use of diverse types of keys due to which the redundancy decreases and flexibility of data storage increases.

The following are the usage of keys in a database:

   It helps in identifying a specific record that is present in the table.

   It is used in minimizing the redundancy from the tables.

   It is used in removing the multi-valued attributes from the relations.

   it helps in connecting one table with others by using Foreign keys.

   It is used in maintaining the uniqueness of the data stored in the database.

   It helps in identifying the relationship between two or more tables.

Types of keys in a relational database:

   PRIMARY KEY: It helps in identifying each record uniquely due to which the redundancy of data can be minimized.

   FOREIGN KEY: It is a kind of referenced key that helps in making a relationship between two or more tables. It helps in fetching records by combining two or more tables with the help of different joins.

   SUPER KEY: It is a combination of two or more keys that can be selected as primary. It may contain those columns which have repeated values.

   COMPOUND KEY: It is a combination of those columns which may not be used independently as the identification of unique records but their combination does.

   CANDIDATE KEY: It is a kind of a super key that does not contain repeated records. A primary key can be chosen from candidate keys.

8 0
3 years ago
A systems analyst attended a week-long workshop on Agile software development. When she returned to her job, she told her boss t
Alexxandr [17]

Answer:

The answer is "disagree"

Explanation:

The system analyst is responsible, who uses research and methods of solving industrial problems with IT. He or she may act as representatives of change that identify, that process improvements needed design systems for such improvements, or inspire us to use systems.

  • Analysts testing and diagnosing issues in operating systems for QA applications and the programmer analyst design and write custom software, that satisfy the requirements of their employers or customers.
  • For the system analysis, the analyst uses all types of techniques, which may be old's, that's why we disagree with the analyst.
5 0
4 years ago
Other questions:
  • What important information is needed if you are installing an oem version of windows 7?
    6·1 answer
  • How important is technology in education? what technology-related skills can you contribute to a school district answers?
    13·1 answer
  • Which of the following are incorrect? Group of answer choices An interface can contain constructors. You may declare a final abs
    8·2 answers
  • What is up with the bots? They are so annoying.
    9·2 answers
  • Help help help help help!!!
    7·1 answer
  • Why does this website have so many copies of plagiarism?
    5·1 answer
  • Hardware is found outside the system unit.​
    13·1 answer
  • Answer the questions given below, share your ideas.Use the space for your answer.
    14·1 answer
  • Find out about the different technological solutions available for interconnecting LANs to from larger networks such as wide are
    5·1 answer
  • As data travels further over a wavelength or frequency, what goes down?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!