1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
3 years ago
9

Advantages of database​

Computers and Technology
2 answers:
Nimfa-mama [501]3 years ago
6 0

Answer:

Reducing Data Redundancy. The file based data management systems contained multiple files that were stored in many different locations in a system or even across multiple systems.

Sharing of Data.

Data Integrity.

Data Security.

Privacy.

Backup and Recovery.

Data Consistency

Explanation:

deff fn [24]3 years ago
6 0

Answer:

Reducing Data Redundancy. The file based data management systems contained multiple files that were stored in many different locations in a system or even across multiple systems. ...

Sharing of Data. ...

Data Integrity. ...

Data Security. ...

Privacy. ...

Backup and Recovery. ...

Data Consistency.

You might be interested in
Date
IRISSAK [1]

Answer:

computer is an electronic machine that accept raw data ,process and then give result. it's uses:

It is used for storing data and information.

5 0
2 years ago
The command to delete all the files that have filenames that starts with letter c or c and ends with a letter z or z is
dimaraw [331]
The command is : <span>rm [Aa]*[Zz] </span>
4 0
3 years ago
What is the definition of posture<br>​
Vinvika [58]

Answer:

The posture is how someone sits at his or her computer.

Hope this helps ;-))

6 0
3 years ago
In this exercise we examine in detail how an instruction is executed in a single-cycle datapath. Problems in this exercise refer
lions [1.4K]

The answer & explanation for this question is given in the attachment below.

3 0
3 years ago
What must you be careful of when retrieving messages/data from mobile devices in public?
pochemuha

We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging.    It is a form of attack through the use of Bluetooth.  It is more than just Bluesnarling and Bluejacking.  It goes beyond, allowing the thieves to take control of a device.

7 0
3 years ago
Other questions:
  • Can i still download an update for an xbox one game if it's not turned on
    13·1 answer
  • What should a safe username do?
    14·2 answers
  • Data governance consists of? A. the processes, methods, and techniques to ensure that data is of high quality, reliable, and uni
    11·1 answer
  • When you perform an in-place upgrade to windows 8.1 from windows 7, what will be names of the “windows” folders in windows 7 and
    5·1 answer
  • Hurry please
    12·1 answer
  • A company that manufactures machine parts orders a new system that makes products at ten times the speed of the earlier machine.
    15·1 answer
  • Plain text and ASCII text are the same thing. true or false
    12·1 answer
  • Do you think people accept poor quality in information technology projects and products in exchange for faster innovation? What
    5·1 answer
  • Please help I will mark brainliest
    5·1 answer
  • Refund please, this has not helped at all.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!