1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
2 years ago
8

What Is database as used in computer science​

Computers and Technology
1 answer:
Natalija [7]2 years ago
8 0

Answer:

A database is an organized collection of structured information, or data, typically stored electronically in a computer system.

You might be interested in
A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
9966 [12]

Answer:

Same Browser

Explanation:

If we access some password for some website in from some computer. It will be saved in the browser of the computer. Whenever we access the website from some other computer and we want to login we need the same browser.

In this process, browser is sync by using our mailing address. Whenever we want to access the pasword of different website from some other device, we need to sync that device browser with the same mailing address.

In this process all password that are saved on other device may access from any device.

7 0
3 years ago
What is targets net worth in 2020 (i will see if you put in 2019)
Schach [20]

Answer:

62.6 billion

Explanation:

3 0
3 years ago
PLEASE HURRY!!<br> Look at the image below!
never [62]
The answer would be 2&5 because this is correct
5 0
3 years ago
Read 2 more answers
Match the term with the appropriate definitions : Edge Computer Applications ANSWERED
WARRIOR [948]
It’s right, good luck.
7 0
2 years ago
owever, sitting in a corner of the store, a hacker had just set up an open "rogue" wireless hotspot posing as the coffee shop’s
Ivenika [448]

However, sitting in a corner of the store, a hacker had just placed up an open “rogue” wireless hotspot posing as the coffee shop’s wireless network. When Sarah logged onto her bank’s website, the hacker hijacked her session and gained access to her bank accounts. Another term for rogue wireless hotspots exists as “evil twin” hotspots.

<h3>What is meant by wireless network?</h3>

A computer network is referred to as a wireless network if radio frequency (RF) links are used to connect network nodes. A common solution for households, companies, and telecommunications networks is wireless networking. Wi-Fi is a wireless networking technology that enables printers and video cameras to connect to the Internet as well as computers (laptops and desktops), mobile devices (smart phones, wearables, etc.), and other devices.

Increased Mobility: Wireless networks give mobile users access to real-time data, enabling them to move freely across the premises of your firm without losing network connectivity. This improves collaboration and production across the entire organisation, which is not achievable with traditional networks.

Hence, However, sitting in a corner of the store, a hacker had just placed up an open “rogue” wireless hotspot posing as the coffee shop’s wireless network. When Sarah logged onto her bank’s website, the hacker hijacked her session and gained access to her bank accounts. Another term for rogue wireless hotspots exists as “evil twin” hotspots.

To learn more about wireless network refer to:

brainly.com/question/26956118

#SPJ4

6 0
1 year ago
Other questions:
  • Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to
    5·1 answer
  • While doing research on the Internet, what kind of website should you avoid because the information may be biased? A) .org. B) .
    15·2 answers
  • what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel
    15·2 answers
  • What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException
    11·1 answer
  • The data in a database management system that identifies the names of​ tables, fields in each​ table, and the properties of each
    13·2 answers
  • PLEASE HELP!!! THIS IS WORTH A TEST GRADE!!!
    13·1 answer
  • Which behavior of the application should the user expect? A user profile has login hour restrictions set to Monday through Frida
    12·1 answer
  • In client server network, there is no central server //// true or false​
    8·1 answer
  • Which of the following transfer rates is the FASTEST?
    15·1 answer
  • Will give brainliest
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!