1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natali 33 [55]
3 years ago
14

Database contain data elements that describe both

Computers and Technology
1 answer:
Simora [160]3 years ago
3 0
Entities and the relationships among entities. The database stores both specify data as well as all the metadata that defines the realtionships between the various packets of data(entities). This could mean programs able to open files, or files that are executable or the last time a file was opened. 
You might be interested in
What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using e
Elden [556K]

Answer:

Follows are the solution to this question:

Explanation:

Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.

Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.

Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.

They can search online for various data encryption. The changes over the last 25 years also actually occurred:

Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.

Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.

World War II would also see Enigma code, the perfect example of analog encryption.

Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.

Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.

Without it.

AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.

6 0
3 years ago
Which of the following is NOT an algorithm?
Nata [24]

Answer:

d) rolling a pair of dice in monopoly

Explanation:

an algorithm is a process or set of rules followed in a particular order to perform a certain task. all of the other answers are a set of instructions that lead to something except for rolling a pair of dice. rolling a pair of dice can be a part of instruction but its not a process in itself.

hope this makes sense!

3 0
3 years ago
. Which one of the following is not a JAD participant? 1. Managers 2. System analyst 3. Business development manager 4. Users
asambeis [7]

Answer: 3) Business development manager

Explanation:

 JAD stand for joint application development and it is the methodology which basically involved users and client in the development and designing of the application.

It is the process which basically accelerate the designing of the information technology system. JAD involve managers , system analyst and users to develop the dynamic solution. But it does not involve the business development manager as the JAD basically focused o the individual approach in the development.

6 0
3 years ago
In network security, a firewall is a device which lies between two networks.
AfilCa [17]
The answer is A. A firewall is a piece of software that monitors all connections to make sure no attacks can be made in the internal or external networks
4 0
3 years ago
Why might you need to convert a file to another file type?
Georgia [21]
Because you might not have same type of file to another computer
3 0
3 years ago
Other questions:
  • You are to create a program using Python that asks the user for a nonnegative number, then computes the mean and variance using
    15·1 answer
  • You listened to a song on your computer. Did you use hardware or software? Explain.
    11·2 answers
  • Which expresses 6y : 9y in its simplest form?
    12·1 answer
  • What is the name of the interface that uses graphics as compared to a command-driven interface?
    11·1 answer
  • To reduce chances of system failure, engineers may use _____ .
    10·2 answers
  • I need help plz it’s python
    6·1 answer
  • What natural resources products are discussed in the article? Are they renewable or nonrenewable?
    6·2 answers
  • Which statement best describes a social impact of computing on the world?
    9·1 answer
  • How many bytes/second is a 16Mbps cable modem connection?
    9·1 answer
  • Explain where the “heart” of the station is and what can be found there? I will mark brainlyest! This is for the ISS (Internatio
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!