1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
3 years ago
10

Which best describes how a supporting database will be structured?

Computers and Technology
1 answer:
Elan Coil [88]3 years ago
5 0

Answer:

DATE SYSTEMS

Explanation:

DATA SYSTEMS

SO SORRY IF IM WRONG

You might be interested in
A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located
iren [92.7K]

Answer is CPU cache

Explanation: A CPU cache is a special high-speed memory which is smaller and faster, and which helps to store copies of data from main memory location which are often used. It is actually located quite close to the processing core, and is used by the CPU of a computer to save time and energy in accessing data from the main memory.

The way it works is if the processor is either trying to read from or write to a particular location in the main memory, it checks to see if the data from the location is already in a cache, if it is, then it alternatively read from or write to the cache; which faster, instead of the main memory.

Please let me know if this helps.

7 0
3 years ago
Read 2 more answers
Does anybody play nitro type
vlabodo [156]

Answer: Nah

Explanation: it kinda sucks and is a waste of time, play better games lol

3 0
3 years ago
Read 2 more answers
A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested
Darya [45]

Answer:

nslookup is the correct answer to the following question.

Explanation:

The following answer is correct because It is the tool or the utility of the command line by which an administrator to query a DNS(Domain Name System) for finding the domain name or the Internet Protocol address or many other records.

<u>Steps to use nslookup:</u>

  • Firstly, you have to press the window key + R to open run.
  • Then, you have to type cmd in it and press enter.
  • Then, cmd will appear after that, you have to type the command 'nslookup' and then press enter.
  • Then, it shows the default server name and ip address after that, you have to type an ip address of DNS server.
  • Then, you have to type 'set' then type q=M X and then press enter
  • Then, you have to type the name of your domain then, press enter key.

7 0
3 years ago
. the fact that a web app is written to be run within any of the standard
Evgen [1.6K]

The correct answer is C) ease of use.

The fact that a web app is written to be run within any of the standard browser and on any platform on which that browser operates is called "ease of use."

The ease of use concept indicates that the product is "amicable" or "friendly" to use by most people because it is not required andy technical knowledge to operate the product. In this case,  the app is written to be run within any of the standard browser and on any platform on which that browser operates, so it is "friendly" to operate bu most systems. App's companies and software companies created this "ease of use" concept for many of their products so they can sell most of them because people know they are easy to use and functional.

7 0
4 years ago
Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
yulyashka [42]

Answer:

c. Two-factor authentication

Explanation:

Two-factor authentication is also known as 2FA. It is an extra form of security put in place aside the use of username and password to ensure the authenticity of someone trying to access an online platform with a registered account.

First the user enters his or her username and password, then they will also have to provide some extra information before finally gaining access. Such information could be ones place of birth, name of pet, something one has or know, etc.

2FA helps to still keep an account safe even if a device or password is been stolen. Two-factor authentication could be SMSbased, hardware token, software token, etc.

4 0
4 years ago
Other questions:
  • I am doing Microsoft Excel and I have do formulas, Can some please explain to me how do them?
    14·1 answer
  • Create a GUI application that allows the user to select a rate category (from a set of radio buttons), and enter the number of m
    6·1 answer
  • Mention<br>any<br>5<br>indicators of<br>happiness​
    11·2 answers
  • Write the proghrams for the following:
    13·1 answer
  • Send the memes whoever is the best will get that crown thing lol
    10·2 answers
  • Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the proto
    5·1 answer
  • Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar
    15·1 answer
  • In the early days of computer technology, which system was justified because data-processing personnel were in short supply, har
    6·1 answer
  • Iman manages a database for a website that reviews movies. If a new movie is going to be added to the database, what else will n
    7·2 answers
  • HELP
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!