1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
13

What is one benefit of creating a blank database instead of using a template? Every user who opens the database will be required

to enter a password, which will keep all the information confidential. The information in the database will be automatically checked for errors, fixing any misspellings and grammatical errors. All the elements of the database will be built specifically for that file and for that purpose, with no surprises or mysteries. The queries in the database will be performed faster because the database will be stored differently from a downloaded database.
Computers and Technology
2 answers:
Likurg_2 [28]3 years ago
7 0

Answer:C - All the elements of the database will be built specifically for that file and for that purpose, with no surprises or mysteries.

Explanation: I just took it

Natalija [7]3 years ago
4 0

Answer:

C. All the elements of the database will be built specifically for that file and for that purpose, with no surprises or mysteries.

Explanation:

I just took the test.

You might be interested in
Which of the following statements is not true about the TCP opening and closing of connections?
lubasha [3.4K]

Answer:  c.)

Explanation:

The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.

It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".

The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.

If one process set the FIN bit to "1", this means that it has no more data to send.

3 0
4 years ago
Effective controls protect ______ from workplace hazards.
erastovalidia [21]

Answer:

Contact your team leader, supervisor, manager, etc.

3 0
3 years ago
Read 2 more answers
You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
Allushta [10]
I use "su -" on my box. Red Hat wanted "sudo -i" in the RHCSA and RHCE courses.
5 0
3 years ago
Jason works as a Help Desk Technician for uCertify Inc. The company has a Microsoft Windows XP-based network. Jason wants to vie
WINSTONCH [101]

Answer:

ipconfig

Explanation:

ipconfig (short for <em>internet protocol configuration</em>) is a command line tool used for determining the network connection configuration of a computer. Some of these configuration information are;

i. the IP address of the computer

ii. default gateway address

iii. subnet mask

iv. Media Access Control (MAC) address.

6 0
3 years ago
You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b.
Yakvenalex [24]

Answer:

D

Explanation:

Encryption secures transmissions on the internet to or from your PC

5 0
3 years ago
Other questions:
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • Signs that a listener is paying attention include:
    10·2 answers
  • While reviewing some web page code, you notice that the html is written in all lowercase letters. you are not sure which version
    14·1 answer
  • What is a nonlinear presentation?
    14·2 answers
  • In the retrieval phase of Godden and Baddeley (1975) study of the encoding specificity principle, participants were asked to sup
    9·1 answer
  • Many people keep time using a 24 hour clock (11 is 11am and 23 is 11pm, 0 is midnight). If it is currently 13 and you set your a
    10·1 answer
  • Write a program that prompts the user to input the number of quarters, dimes, and nickels. The program then outputs the total va
    10·1 answer
  • ____________ facilitates the processes that help an organization function by applying information and communication technologies
    5·1 answer
  • Most of us have been using elements of Web 2.0 without even realizing it.<br> True<br> False
    6·1 answer
  • Does technology shape society or does society shape technology?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!