1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
3 years ago
11

List three functions that you can perform with a database that you cannot perform with a spreadsheet.

Computers and Technology
1 answer:
Delicious77 [7]3 years ago
5 0
There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.
You might be interested in
For computer forensics, ____________ is the task of collecting digital evidence from electronic media.
Zanzabum

For computer forensics, <u>data acquisition</u> is the task of collecting digital evidence from electronic media.

<h3>What is data acquisition?</h3>

Data acquisition is the process of gathering digital evidence from electronic media for computer forensics. Static acquisitions and live acquisitions are the two different categories of data acquisition.

You learn how to carry out static acquisitions from digital material in this chapter. It is the process of digitalization of data from the world.

Thus, <u>data acquisition</u> is the task of collecting digital evidence from electronic media.

To learn more about data acquisition, refer to the link:

brainly.com/question/28233320

#SPJ4

7 0
2 years ago
in a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n)-------------------- respon
nataly862011 [7]

Answer:

Conditioned response

Explanation:

In a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n) conditioned response.

The dog has been conditioned to respond to the constant sound before his meal is served by drooling(salivating ) with the expectation of eating almost immediately after the sound had been made .

4 0
3 years ago
Where would you go to add fractions to a document in adobe indesign
prisoha [69]

Just select the fraction text and choose Open Type > Fractions from the Character panel menu.

5 0
3 years ago
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
The true or false questions.<br><br> 1.egrep can accept multiple filenames as input arguments.
BlackZzzverrR [31]

Answer: True  

Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.

5 0
4 years ago
Other questions:
  • When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met
    6·1 answer
  • ____, developed by xuejia lai and james massey, is a block cipher that operates on 64-bit blocks of plaintext.
    10·1 answer
  • To complete this quest, answer the following questions in the submission box below. Make x an array going from 0 to 100 by steps
    15·1 answer
  • The best way to achieve stronger encryption is to
    13·1 answer
  • #Write a function called hide_and_seek. The function should #have no parameters and return no value; instead, when #called, it s
    7·1 answer
  • Which network component is used to connect one network to another? Which component delivers the message to the destination compu
    5·1 answer
  • Write a string class. To avoid conflicts with other similarly named classes, we will call our version MyString. This object is d
    5·1 answer
  • CSNET Stand for in a computer
    11·1 answer
  • Which components must all tasks have? Check all that apply.
    10·1 answer
  • 1. Who was the first lady programmer?​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!