1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
just olya [345]
3 years ago
13

tell us things u did as a kid but don't want to admit to it (best gets brainly 5 stasr and a thank you)

Computers and Technology
2 answers:
Aleonysh [2.5K]3 years ago
7 0

Answer:

i used to gradually steal things out of my moms room like makeup and i would try to use it right before i got in the shower

Explanation:

i looked like human shrek man

Zarrin [17]3 years ago
4 0
Convinced my youngest brother to pee down a slide, then pushed him down it. I still feel terrible about it 10+ years later.
You might be interested in
The disadvantage of this topology is that a problem with one node will crash the entire network.
DanielleElmas [232]

Answer:

Bus Topology

Explanation:

In local area networks (LANs), Bus topology is used to connect all the computers on the single cable. This cable is called backbone of the network.  In this type of network when a computer sends data, it will be received on entire network.

For Example

In water line system, all the taps that are connected to single pipe. If the pipe or a single tap broken this will affect the whole system.

Entire system can be crash if any node or wire will break.

6 0
3 years ago
What does this mean?​ pls help me
Darya [45]

Answer:

it means your name hunny so example mine is Carlie Jayden B so I'll put CJB you put the first letter of your name instead of the full name

6 0
3 years ago
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
allochka39001 [22]

Answer:

hybrid

Explanation:

A hybrid attack is a blend of both a dictionary attack method as well as brute force attack. This means that while a dictionary attack method would include a wordlist of passwords, the brute-force attack would be applied to each possible password in that list.

7 0
3 years ago
Microsoft sql server, oracle, db2 are examples of:_____.
Sloan [31]

Oracle, DB2, and Microsoft SQL Server are examples of RDBMS. Therefore, the <u>correct option of this question is (c)</u> i.e. RDBMS.

A software used to store, query, and retrieve data stored in a relational database is referred to as a relational database management system (RDBMS). In RDBMS, data is represented in tables with rows and columns.

The RDBMS handles administrative functions such as managing data access, storage and performance. To perform these administrative services, RDBMS provides an interface between the database, applications and users.

Some features of RDBMS are described below:

  1. RDBMSs are more secure, faster and easier to work with.
  2. More than one user can have access to RDBMS at a point of time.
  3. RDBMS supports distributed databases.
  4. RDBMS can store a vast amount of data.
  5. Only the data in the form of tables is managed by RDBMS.
  6. Data redundancy is reduced in RDBMS using primary keys and indexes.

Thus, Oracle, DB2, and Microsoft sql server are example of RDBMS.

<u>While the other ptions (a) supply chain management and (b) erp applications are not correct because:</u>

  • Supply chain management is a centralized management process that handles the flow of goods and services, such as movement and storage of raw materials, inventory, finished goods, and delivery of the final product.
  • Enterprise resource planning (ERP) applications refers to software used in organizations to manage day-to-day business operations such as project management, risk management and compliance, procurement, accounting and supply chain operations.

You can learn more about relational databases at

brainly.com/question/13262352

#SPJ4

7 0
1 year ago
Which of the following are advantages of using cell protection in spreadsheets? Choose all that apply.
Y_Kistochka [10]

Answer: 1 and 2

Explanation: the answer would be both 1 and 2 like you had stated in the description.

6 0
3 years ago
Other questions:
  • You are the administrator for the contoso.com website. recently, the server hosting the website had a failure that caused it to
    13·1 answer
  • How to stay organized in an online school?
    7·1 answer
  • Pda bkhhksejc pnwjoynelp dwo xaaj ajykzaz ywj ukq zaykza ep???<br><br><br> The Key Value is 22
    12·1 answer
  • The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
    15·2 answers
  • What was the first video game ever invented
    11·2 answers
  • What is best for a busy student to do for better results in school?
    10·2 answers
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • Write a program that accepts a whole number as input, multiplies that number by 12, and then outputs the product.
    6·2 answers
  • Im lonellly whos down to date me
    7·2 answers
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!