1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
15

45 points!!

Computers and Technology
2 answers:
Alex Ar [27]3 years ago
7 0

Answer:

ENQUIRE

Explanation:

Tim Berners-Lee built a database called <u>ENQUIRE</u>.

pav-90 [236]3 years ago
5 0

Answer:

ENQUIRE database system

Explanation:

You might be interested in
You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
tiny-mole [99]
The answer you're looking for might be "backwards-compatible".
7 0
4 years ago
Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
Liula [17]
He should launch an M-commerce app
5 0
2 years ago
Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
gizmo_the_mogwai [7]

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.

5 0
3 years ago
To create a digital signature, two steps take place that result in the actual signature that is sent with data. In the first ste
Ket [755]

Answer: Integrity verification of message.

Explanation:  Digital signature is used for the security purpose of the documents by the encryption technique such as passwords etc.The signature is created electronically for a digital document protection.The document is authenticated if correctly signed by the user/signer .

The collection of algorithms that are encrypted verifies the authenticity while being transferred if document content does not get tampered.This is the verification of integrity of the message sent from the sender to the signer.

4 0
3 years ago
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate progr
Natasha2012 [34]

Answer:

Usurpation

Explanation:

In context of CIBS-210 it is known as Usurpation

6 0
3 years ago
Other questions:
  • A technology _____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is
    13·1 answer
  • Qu'est-ce qui motive le choix d'une autre?
    7·1 answer
  • _____is empty space between the margin and text.
    8·1 answer
  • Martha is a healer, a healthcare provider, and an experienced nurse. She wants to share her daily experiences, as well as her 12
    9·2 answers
  • A company uses DHCP servers to dynamically assign IPv4 addresses to workstations. The address lease duration is set as 5 days. A
    6·1 answer
  • An employee believes there is an imminent danger situation at her workplace. She contacts OSHA to report the safety hazard. Her
    8·1 answer
  • You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
    12·2 answers
  • which of the following is a likely problem for a driver in an urban area? A. fame animals on the roads B.not finding a gas stati
    6·1 answer
  • In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds.
    8·1 answer
  • PLEASE HELP ME WITH MY UNIT TEST!!!!!!!!!!!!!! I'M STRUGGLING AND I AM ESPECIALLY STUCK ON THIS ONE!!!!!!!!!!!!!!!!!!!!!! FOR BR
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!