1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
3 years ago
13

What are examples of data duplication in flat files? Check all that apply.

Computers and Technology
2 answers:
IrinaVladis [17]3 years ago
8 0

Answer: a table with three records for student ID # 459100388 and a multiple-choice question with two identical answers. Otherwise options 2 and 3.

Explanation:

EDG2021

photoshop1234 [79]3 years ago
7 0

Answer:

Flat file databases are databases that are contained in one single table, or in the form ... -Data Redundancy, By having a relational database it ensures that no attributes ... There are only three different 'degrees' of relationship between two entities. ... Consider, for example, the link between customers, orders and products.).

Explanation:

You might be interested in
What actions might contribute to recommendations you see online?
Virty [35]

Answer: what you search up

8 0
2 years ago
“Urban Populations” should fall under which sections of your organizer?
ELEN [110]

Answer:

a = TOPIC

Explanation:

4 0
3 years ago
Read 2 more answers
Which statement describes the relationship between science and technology?
Elden [556K]
Answer: science is the study of the world, and technology changes the world to solve problems.
3 0
3 years ago
Read 2 more answers
Which of the following is a technique for storing or copying log events to acentralized logging server?a. Syslogb. Write­once re
Neporo4naja [7]

Answer:A) Syslog

Explanation: Syslog is the log for the messaging in the computing field.It acts as a separator for the different task that is related to messaging. The task usually are storing of message, production of the message through software,analyzing message, reporting it etc.

Other options given in the question such as WORM storage is for the storage technology,UTM is for the management for the threat situation and firewall logging is related with log/tables for firewall.

Thus, the correct option is option (A).

5 0
3 years ago
Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorilla
Deffense [45]

Answer:

c

Explanation:

7 0
3 years ago
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • Trish uas bought a new computer, which she plans to start working on aftwr a week. Since Trish has not used computers in the pas
    13·1 answer
  • What is the subnet mask ?
    9·2 answers
  • A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
    13·1 answer
  • Which of the following is not a type of Internet Job Board? Options Resume Blaster Professional Association Target Applicants We
    8·1 answer
  • Which protocol sends a request to view or download a website or file ​
    7·1 answer
  • How do assignment article computer security, ethics and privacy?
    15·1 answer
  • Choose the parts of the browser window. PLEASE ANSWER QUICKLY TEST
    12·2 answers
  • What is the computer system cycle called?
    13·1 answer
  • 2. The Warren Commission investigated the assassination of President _______________________ in 1964.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!