1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
7

5. Give an example of a database application that has hundreds of users and a very large and complicated database.

Computers and Technology
1 answer:
Sunny_sXe [5.5K]3 years ago
6 0

Answer:

IBM DB2

Explanation:

Database Applications are separate applications that do not have a specific database, instead, they are used to be able to manipulate any database that you have access to. One very popular database application that has hundreds of users is IBM DB2. This database application was created by the company IBM which is a multinational company and can even be used to access their own database which is extremely large, and as any database the larger it is the more complicated it is as well since there is more data to sift through

You might be interested in
"When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets whe
lakkis [162]

This is false negative. To be marked for alert.

<u>Explanation:</u>

The network administrator or network engineer when he or she is analyzing IDS logs and founded the ip address is same on source and destination both in outside side.

So the either TCPIP address has to change to be scanned across the network. Since same IP address is same pinging rate will high and pinging the same workstation or desktop or laptop.

Alert will not generate because both tcpip address same and if pinging is success.  Ids logs generates based true negative, true positive and false positive will not generate any alert.

5 0
4 years ago
What does the abbreviation BBC stands for?
kati45 [8]

Answer:

British Broadcasting Corporation Microcomputer System

Explanation:

The British Broadcasting Corporation Microcomputer System, or BBC Micro, is a series of microcomputers and associated peripherals designed and built by the Acorn Computer company in the 1980s for the BBC Computer Literacy Project.

4 0
3 years ago
Read 2 more answers
Heya!!<br><br> -:QUESTION :-<br><br> DEFINE DATA SCIENCE?​
finlep [7]

\large \underline{ \frak{ ~~~~~~~~~~~~~~~~~~~~\bigstar Solution~~~~~~~~~~~~~~~~~~~~}}

Data science helps to understand and analyse the actual scenario and help to take fruitful decisions. 

4 0
3 years ago
Read 2 more answers
How would you convert this base 10 decimal into a base 2number?:
Tju [1.3M]

Answer:

The method of converting a base 10 or decimal number into base 2 or binary number is as following:-

  1. Divide the decimal number by 2 and store it's remainder.
  2. keep dividing the decimal number by 2 until it becomes 0 and also keep storing it's remainder.
  3. Then write the remainders in reverse order.This the binary number.

Refer the attached image for better explanation.

6 0
4 years ago
Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
Elanso [62]
B False





---------------------------------
3 0
4 years ago
Other questions:
  • Linda and her mom want to start a company selling homemade brownies to large supermarket chains. To get started, they have creat
    14·1 answer
  • What do developers do to support software products? explain to users which development process model was used to make the produc
    8·1 answer
  • Which guideline should you use when downloading software from the internet?
    12·2 answers
  • A client contacted you to request your help in researching and supplying the hardware necessary to implement a SOHO solution at
    5·1 answer
  • A person gets 13 cards of a deck. Let us call for simplicity the types of cards by 1,2,3,4. In How many ways can we choose 13 ca
    5·1 answer
  • Consider the expression 3 * 2 ^ 2 &lt; 16 5 AndAlso 100 / 10 * 2 &gt; 15 - 3. Which operation is performed second?
    6·1 answer
  • Which software is used for cover letters and resumes
    9·2 answers
  • Answer will be marked brainliest
    11·1 answer
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • Please Help meeeeeeeeeee:
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!