1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
8

DifferentsDIFFERENTIATE BETWEEN FORMULA & A FUNCTION Giving Example​

Computers and Technology
1 answer:
wel3 years ago
3 0

Answer:

?

Explanation:

You might be interested in
An auxiliary view is always projected from the view that shows the inclined surface as a(n) _____.
ValentinkaMS [17]
Auxiliary section i think
8 0
3 years ago
Which is the last step in conducting a url research
tino4ka555 [31]
<span> The user's browser renders the html code as a visual web page. I think. Let me know if I git it wrong! :P</span>
6 0
4 years ago
Which of the following is NOT correct concerning database design? Question 2 options: Identify all fields needed to produce the
PtichkaEL [24]

The option which is not correct concerning database design is identify all fields needed to produce the required information.

What is database design?

The database design is the arrangement of the data or the information, according to the model of database.

Let's check all the option one by one,

  • Identify all fields needed to produce the required information- This does not concern with the database design.
  • Group related fields into tables-A relation database design consist of one or more than one related table. These tables are used together when the information is required.
  • Determine each table's primary key- To determine the table's primary key, is the concern with the database design.
  • Organize each piece of data into its largest useful part-The database design is the organization of data in the model of database.

The option which is not correct concerning database design is identify all fields needed to produce the required information.

Learn more about the database design here;

brainly.com/question/25694408

8 0
3 years ago
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop throug
andreev551 [17]

Answer:

B. Windows domain user name and password

Explanation:

Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.

The domain username and password are usually stored on a domain controller rather than on the host.

As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.

8 0
4 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
4 years ago
Other questions:
  • Fredrick wants to revise an employee policy. If he wants to inform all of the employees of the change, what type of document wil
    10·2 answers
  • Computer user support helps people with minor computer problems. <br><br> True or False
    12·1 answer
  • How do you make your graphics ADA accessible in BlueGriffon?
    12·2 answers
  • Why is outfitting a workplace with video games in a technology development company consiered a strategic use of money
    14·1 answer
  • I didn't go to school today and i want to know if my teacher would contact my parents.
    15·1 answer
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • . What is a destructor and what is its purpose?
    5·1 answer
  • 1) a program that is designed to perform only one task.
    11·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • Question 1 (1 point)
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!