1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
6

A database administrator (DBA) may perform which roles? Select all that apply.

Computers and Technology
1 answer:
ArbitrLikvidat [17]3 years ago
3 0
The answer is A or C
not sure
You might be interested in
In many cases, a ribbon organizes buttons and options in Select one: a. menus. b. sections. c. toolbars. d. groups.
katrin2010 [14]

Answer:

The answer is Groups

Explanation:

A ribbon organizes buttons and a program’s options into a series of groups or tabs at the top of the window. Typical ribbon tabs are composed of groups that are labeled as closely related commands. Dividing commands into groups in most Microsoft Office application helps users structure users structure the commands into related sets.

5 0
4 years ago
Read 2 more answers
A web designer finds out after the launch that one of the external links did not have "http://' and therefore the link appeared
Bumek [7]
Answer is oc design testing
3 0
3 years ago
You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a passwo
Sergio039 [100]

Answer:

What you should do is to move the motherboard jumper.

Explanation:

Based on the information given in a situation where you boot the computer system in which you find out that there was a password set on the BIOS which full meaning is BASIC INPUT/OUT SYSTEM which means that if You need to clear the set password in order for you to edit the CMOS settings which full meaning is COMPLEMENTARY METAL OXIDE SEMICONDUCTOR What you should do is for you to move the MOTHERBOARD JUMPERS reason been that jumpers will help to set or configure the MOTHERBOARD which is the most important part of a computer and the brain of a computer in order to clear the password so that CMOS setting can be edited.

5 0
3 years ago
Mr. Brody made a spreadsheet with student names in order to take attendance. Which method is best for sorting this data?
user100 [1]
Maybe alphabetical order 
6 0
3 years ago
Read 2 more answers
What piece of hardware directs traffic between the connected devices when two LAN's are communicating across the Internet?
luda_lava [24]

Answer:

The correct answer is "Router".

Explanation:

In networking, routers is one of the main hardware which is used to direct the data traffic on a LAN system.

The router also works as an interconnection system for two or more than two networks. Routers mostly work between the internet and computer which directs the data to its right path.

It works between the computer system in a premise to make the networking possible through a LAN by using switches for communication between two or more than two devices in a LAN across the internet.

Hence, the most appropriate answer is the router.

3 0
3 years ago
Other questions:
  • What is the device called which typically combines the capabilities of a scanner, printer, fax, and copying machine?
    15·1 answer
  • When should students practice netiquette in an online course? Check all that apply.
    14·2 answers
  • Each warning label must contain this element and its purpose is to provide a visual alert to users to the chemical hazards to wh
    14·2 answers
  • Given the network 192.168.100.0/24, we are going to segment this network into two subnets, Subnet A and Subnet B. The hosts requ
    10·1 answer
  • Write a MATLAB code for the following problem:
    13·1 answer
  • The keys to successful outsourcing are accountability, reporting, and ___
    7·1 answer
  • Communication protocols, sets of rules agreed to by all parties, are designed in order to:
    15·1 answer
  • What is data and information
    9·1 answer
  • 1. (01.03 MC) What is a string in Python
    9·2 answers
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!