1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
velikii [3]
3 years ago
10

A SQL data source is a control that can be used to get data from a SQL ________________ file such as a Microsoft SQL Server file

. g
Computers and Technology
1 answer:
AleksAgata [21]3 years ago
3 0

Answer:

The answer is "Data"

Explanation:

A Data source is essentially the wellspring of the Data. It tends to be a document, a specific Database on a DBMS, or even a live Data feed. The Data may be situated on a similar PC as the program, or on another PC some place on an organization

At least, every SQL server database has two working operating system records: a Data filet and a log Data. Data files contain Data and items, for example, tables, files, put away methodology, and perspectives. Log records contain the data that is needed to recuperate all exchanges in the Database. Data files can be assembled in file groups for portion and organization purposes.

You might be interested in
True or false Encryption prevents hackers from hacking data?
nlexa [21]

Answer:

The answer here is False.

Explanation:

Encryption protects the data and not access to data.

In some cases, the hacker may not necessarily be trying to access or decrypt the data. They may prevent one from accessing it by placing a Ransomeware virus on it.

What a Ransomeware virus would do is to prevent the legal and rightful owner from accessing such data (whether encrypted or not) until their demands are met.

In many cases, they would ask for monies or cryptocurrencies.

Another way hackers attempt to get encrypted files is to try to get the decryption keys instead. The best practice against this is to keep decryption keys manually or in a password manager. Another way to protect very sensitive information is to have sensitive systems isolated from the internet.

Cheers

8 0
3 years ago
If number is 20, what is printed to the console after this code is executed?
exis [7]

Answer:

Option a is the correct answer for the above question

Explanation:

  • The above question code has one for-loop which runs two times only for the value of number=20.
  • It is because when the if-condition will true then the loop will be exit because it holds the break statement which exits the for-loop when the if-condition will be true.
  • So when the first time 20 will divide by 3 then if-condition will fail, but when the 20 will be divide by the 5, then the if condition will be true and the 5 will be printed as output.
  • Then the second if-condition will false because it will be true for the 20 value of i.
  • Hence option a is the correct answer while the other is not correct because others will not hold the output of this code.
3 0
3 years ago
The method header of the equals() method within the string class is ____.
erastovalidia [21]

public boolean equals(string s)

This statement is the Java Programming in which equals() method compares the original substance of the string

8 0
3 years ago
What describes an agreement between two or more parties and demonstrates a "convergence of will" between the parties so that the
Yuri [45]

Answer: C) MOU (memorandum of understanding )

Explanation:

MOU(memorandum of understanding) is defined as lawful and formal binding agreement that occurs in two or more parties.The parties involved in this agreement have respect, similar life of action, responsibilities and seriousness towards each other which makes them under legal contract. It also displays the convergence of will between involved parties.

Other options are incorrect because political action committee(PAC) , International Society of Arboriculture(ISA) and NDA (Non-Disclosure Agreement) are the type of group and agreement that work at society , politics and non-disclosing state.Thus, the correct option is option(C).

8 0
3 years ago
Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
Troyanec [42]
Eating a potato is what hes using
3 0
3 years ago
Other questions:
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • What is cryptocurrency ? I need to do a research one it please help!
    6·1 answer
  • Define a function below, get_subset, which takes two arguments: a dictionary of strings (keys) to integers (values) and a list o
    8·1 answer
  • Is a ryzen 5 3600 and a gtx 1660 super a good combo? ​
    13·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • What is the most likely result of making a plan for life after high school
    14·1 answer
  • Consider having three String variables a, b, and c. The statement c = a + b; also can be achieved by saying_____________.a. c =
    11·1 answer
  • Displays information a bout drivers, network connections, and other program-related details.
    6·1 answer
  • You decided to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the Internet that support
    10·1 answer
  • Could some please answer the question in the pictures? Thank you!! I will also give your brainliest if you give me the right ans
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!