1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
7

A database that is created and maintained using services such as Microsoft Azure or Amazon AWS is called a(n) _____ database.

Computers and Technology
1 answer:
Phantasy [73]3 years ago
5 0

Answer:

It is called a cloud database

You might be interested in
How do you delete a slide from your presentation after selecting it
Sergeeva-Olga [200]
Use your right clicker and it should pop up as delete slide

6 0
4 years ago
Pleaseeeeeeeee I will give a brainliest
gogolik [260]

Answer:

Below the subject

Explanation:

6 0
3 years ago
What is one effective way for employees to keep their skill-sets current
natta225 [31]
Is it a multiple choice answer? if so would like to see the answers as there are TONS of effective ways and if i list one it may not be in that list you have if its multiple choice.
3 0
3 years ago
When someone asks, Is this information specific enough?, he or she is interested in more _____.
AVprozaik [17]

Answer:

precision

Explanation:

In simple English precise means exact or something specific

5 0
3 years ago
Read 2 more answers
Once an illustration has been decomposed, you can change the color of different items in that illustration.
Delicious77 [7]

Answer:

its true

Explanation: took the quiz

3 0
3 years ago
Other questions:
  • In a word processing program, the ribbon or menus contain the
    12·1 answer
  • Which of the following is a reason photographing animals can be difficult?
    9·2 answers
  • A(n) ______________________________ is a camera mount that uses the concept of a lever and fulcrum and allows a camera to be rai
    9·1 answer
  • Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
    12·1 answer
  • The three activities in an information system that produce the information organizations use to control operations are:a.informa
    9·2 answers
  • Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
    8·1 answer
  • When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
    13·1 answer
  • A user is attempting to access a shared file locally on their workstation. The file has Full control NTFS permissions assigned,
    14·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·2 answers
  • 5. Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical examp
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!