1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GalinKa [24]
3 years ago
9

When a customer makes an online hotel booking the database is updated by using

Computers and Technology
2 answers:
Valentin [98]3 years ago
4 0
I think it’s a form,if wrong please don’t be mad
klemol [59]3 years ago
4 0
C because hotel managers use technology to update stuff.
You might be interested in
What type of security solution provides a hardware platform for the storage and management of encryption keys?
shutvik [7]

The type of security solution provides a hardware platform for the storage and management of encryption keys exists hardware security modules .

Hardware security modules (HSMs) supply an effective method to control encryption keys.

<h3>What are Hardware security modules?</h3>

A hardware security module (HSM) exists as a physical machine that supplies extra security for sensitive data. This kind of device exists utilized to require cryptographic keys for essential functions such as encryption, decryption, and authentication for the usage of applications, identities, and databases.

The hardware usually costs at least USD 20,000 to deploy, USD 40,000 for increased accessibility, and multiple periods better for normal enterprise deployment.

Hardware Security Modules (HSMs) exist in hardened, tamper-resistant hardware appliances that strengthen encryption techniques by developing keys, encrypting and decrypting data, and designing and demonstrating digital signatures.

A Hardware Security Module (HSM) exists as a hardware-based protection appliance that develops, stores, and protects cryptographic keys. Sterling Secure Proxy utilizes keys and certificates stored in its store or on an HSM.

To learn more about Hardware Security Module refer to:

brainly.com/question/24118720

#SPJ4

7 0
2 years ago
A computer never gets tired or bored while working for a long time .. ​
Angelina_Jolie [31]

Answer :Computers never get tired or bored because of doing the same task continuously. They work in the same manner all the time. A computer can store large amount of information in its memory.

Explanation: it is quality which makes the user to be dependent on computer. As we all know, computer systems do repetitive tasks without any boredom, tiredness, or fatigue.

5 0
3 years ago
How come the scroll bar on the PA emojis only appears sometimes? how do I make it appear?
astraxan [27]
Answer it your own self everybody can't always give u the answers
5 0
3 years ago
Measurement consists of:__________
Naddik [55]

Answer:

The answer is choice "a".

Explanation:

Measurement is a number allocation in which the entity or event attributes that would be comparable with other objects or events. Its scope and implementation depending on context and discipline.  

  • Its main purposes could be defined as measurements for efficiency, tracking, health, fitness (design, mounting), and solving problems.  
  • Its calculation consists of the numerical assignment, representing attribute amounts according to the rules for objects and events.
3 0
3 years ago
After Intel faced strong shifts in technologies, such as cloud services, social networking, mobile devices, etc., Intel realized
Crazy boy [7]

Answer:

d. Information governance board

Explanation:

In 2004 <em>Intel </em>was in need of a governance process as part of the company’s policy of <em>Intel’s Information Management (IMM)</em>. Such policies and governance were important in the corporation’s process in order to mirror the local laws as well as to reproduce Intel’s dynamic nature of its activities as a corporation. The <em>Information Governance Boards </em>were intended for every main data area of the company: <em>location, item, finance, customer, supplier, and worker</em>. Such Governance Boards would engage business people in the company to  embrace the stipulated policies also with the purpose of proptecting information.

8 0
3 years ago
Other questions:
  • Select the most likely outcome of making only on-time minimum payments to a credit card with a balance for an entire year?
    7·2 answers
  • The superclass Calculator contains: a protected double instance variable, accumulator, that contains the current value of the ca
    5·1 answer
  • When selecting text in word, holding down the ctrl key while clicking the mouse button will select the?
    15·1 answer
  • Which of the following techniques would a Baroque composer most likely employ to evoke an affect of agitation? Select one:
    14·1 answer
  • Write a program to compute answers to some basic geometry formulas. The program prompts the user to input a length (in centimete
    7·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { ​ int x = 2; ​ int y = 20 ​ int counte
    6·1 answer
  • ___________ key encryption in wep uses the rc4 encryption algorithm.
    9·1 answer
  • To create an SSL connection, a Web server requires a ________, which is an electronic document that confirms the identity of a w
    12·1 answer
  • How to convert binary to decimal <br> Please it’s so hard and what is digital and analogue
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!