Answer:
I don't understand this either sorry
Explanation:
I'm going to say a chart. I could be wrong. If the chart didn't have text with it- how do you know what the chart is for?
A map, it needs text, but these days people just use GPS's.
Answer:
i would say C.output
Explanation:
the program would be the code, the input would be the input, and the memory card would be the memory leaving the output as the only thing forgotten.
Answer:
The answer is A. True.
Explanation:
Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.
It can also be defined as -
The detection and provisoon of solutions to security breaches.
Access controls, which prevents unauthorized system access.
Protection of information either in transit or in a storage area.
A(n)<u> Instead Of trigger </u>is a pl/sql block that manages in place of a dml action on a database view.
<h3>Why instead of triggers are used?</h3>
INSTEAD OF triggers describe how to perform insert, update, and delete functions against complex views. INSTEAD OF triggers permit applications to use a view as the sole interface for all SQL operations.
<h3>What are the after triggers?</h3>
An after trigger runs after the connected insert, update, or delete changes are involved to the table. The WHEN condition can be used in an SQL trigger to specify a state. If the condition evaluates to true, the SQL views in the SQL trigger routine body are run.
To learn more about Instead Of trigger, refer
brainly.com/question/21564232
#SPJ4