1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariana [72]
3 years ago
13

What does the Sort feature do with a database

Computers and Technology
1 answer:
WARRIOR [948]3 years ago
6 0
Nothing. If you SELECT data from a database, and add an ORDER BY clause, it just affects the ordering of the data that is returned to the user, but the data in the database remains unaltered.
You might be interested in
Is it bad to leave external hard drive on for hours
alexandr402 [8]
Yes, because it can cause fires and electrical problems
8 0
3 years ago
I need help with this question. asap please
marissa [1.9K]

Answer:

what are you talking about

Explanation:

can you help me with my question

8 0
2 years ago
Your friend just noticed his smartphone's battery is running low. Unfortunately, your friend isn't very knowledgeable about comp
AlekseyPX

Answer:

Lightning

Explanation:

<em>Apple Inc. designed and developed the Lightning computer bus and power connection. Apple mobile devices such as iPhones, iPads, and iPods use the Lightning connection to connect to host computers, external displays, cameras, USB battery chargers, and other accessories. Lightning is substantially smaller than its predecessor, with only 8 pins instead of 30.</em>

3 0
2 years ago
The GPS device in an automobile uses which communication channel?
Feliz [49]
The GPS device in an automobile uses the satellite communication channel. GPS stands for Global Positioning System. It is based on the satellite navigation system that consists of a number of satellites. This is being used to loacate places and determine exact location, time and speed.
4 0
3 years ago
Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
Tems11 [23]

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

8 0
3 years ago
Other questions:
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • A county collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a h
    13·1 answer
  • * Create a list of places and situations in which we use a computer
    11·1 answer
  • A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network v
    8·1 answer
  • Write out a shorthand version of the border property which will apply border that is 5 px wide, colored in lightgreen, and solid
    9·1 answer
  • Describe how learning can be accessed in your class?​
    14·1 answer
  • Login
    11·1 answer
  • বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
    10·2 answers
  • The average numbers of shares a piece of content receives is known as its:
    7·1 answer
  • Do you think Apple will eventually meet their goal of becoming a replacement for a physical wallet
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!