1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
12

Kevin needs to get his data from a database into a text file to send to another group. He needs to _____.

Computers and Technology
2 answers:
Rasek [7]3 years ago
6 0
A.Export

I got it right on test
Leona [35]3 years ago
5 0

Answer:

pretty sure that it would be A. Export :)

----------------------------------------------------------------------------------------------------------------

Explanation:

Because B and C don't make too much sense, and D would mean to 'bring in' and A means the opposite, which is take out.

You might be interested in
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
3 years ago
When implementing best practices, you will use external standalone firewalls whenever possible, but you won't go without a built
Andrews [41]
The answer is true

Technically, we have two types of firewall, a one way firewall and a two way. A one-way firewall will protect you from incoming threats. A two-way built-in or standalone firewall will add another layer of protection and thus, it is a must have tool.


8 0
3 years ago
Which tool lists active tcp connections?
dimaraw [331]
Netstat
Type netstat -a to get a complete overview.
8 0
4 years ago
An automated search feature used by search engines to find that match your search terms is called a spider or
9966 [12]

Answer

Crawler

Explanation

This is a program that go to various website to read their pages and content provided in order to form entries for a search engine index.All search engines have this program called spider or a bot. It acts as an automated script that browses through the internet to scan the web pages and find words contained in the pages and where the words are used.


5 0
4 years ago
Read 2 more answers
The requirement, "The system shall receive information quickly," is an example of a functional requirement.
olga55 [171]

Answer: False

Explanation: Functional requirement is the requirement in the operating system that gives the description of the functioning and specific action that is done by system.

Thus, receiving the data rapidly is not the form of functional requirement as it does not specifies any function that is to be done and receiving of data is already being done and at faster rate in future.

Performance requirement is the factor that is required for defining that how well a system should perform the function.So, reviving data at rapid rate is performance requirement.So, the statement given is false.

6 0
4 years ago
Other questions:
  • The _______________ layer of the TCP/IP protocol suite is responsible for making sure that what leaves one end of the network ar
    9·1 answer
  • HELP! Identify the parts of the table. <br>A) Primary Key<br>B) Field<br>C) Record<br>D) Table<br>​
    15·2 answers
  • The version of Windows that first provided networking capabilities was _____.
    12·2 answers
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    10·1 answer
  • You can use the Trim Video feature to specify a video file’s Start and End time in order to control which portion of the video f
    5·1 answer
  • Number Array Class
    5·1 answer
  • Programmers should strive to _____. increase coupling increase cohesion both of the above neither a nor b
    7·1 answer
  • In PowerPoint _____ management is extremely important and you must keep track of what links, files, and programs are placed in w
    14·1 answer
  • We call any device connected to the Internet a(n) ________. Group of answer choices router host IP client
    9·1 answer
  • A technique that was developed to determine whether a machine could or could not demonstrate the artificial intelligence known a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!