1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
3 years ago
7

Vivek wants to save the data about his grocery store in a single table. Which among the following type of databases is used in t

his scenario
Computers and Technology
1 answer:
Orlov [11]3 years ago
4 0

Explanation:

A centralized database (sometimes abbreviated CDB) is a database that is located, stored, and maintained in a single location.

You might be interested in
What are source data entry devices​
matrenka [14]

Answer:

<u><em>Source data entry devices are used for audio input, video input and to enter the source document directly to the computer. Source data entry devices do not require data to be typed-in, keyed-in or pointed to a particular location.</em></u>

Explanation:

7 0
3 years ago
The open items on your computer are displayed here. menu bar open bar taskbar toolbar
Dennis_Churaev [7]
Maybe the answer is the Taskbar?
8 0
3 years ago
Read 2 more answers
Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.
docker41 [41]

Answer:

To protect a formula

Explanation:

One common example to apply cell protection to spreadsheet entries is to protect a formula used in the sheet to calculate payouts or rankings for example.   A manager might want to share the results of the team to all its team and provides some ranking or other form of calculations in the sheet.  He then needs to protect the formula so it's not altered by the team members or anyone else reviewing the file.

6 0
4 years ago
The U.S. is a major player in the global media domain. However, other nations play a role in creating a dominant ideology, as ev
poizon [28]

Answer:

The answer is "Authorization for mobile wiretaps on American citizens."

Explanation:

  • The term media includes advertising, documentaries, painting, and graphic, which allows you to use a blog's domain name, and it can also provide you to create a fake profile.
  • In certain countries, a prevailing philosophy is performed, as demonstrated by the prevalence of telecommunications wiretaps approved in Sweden by US residents.
6 0
3 years ago
List the difference between sdram and dram​
IRISSAK [1]

Answer:

i need this for a challenge

Explanation:

4 0
3 years ago
Other questions:
  • Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
    5·2 answers
  • Write the statements needed so that the variable secondWord is associated with the second word of the value of sentence . So, if
    13·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • How do you compare text on different pages of a document?
    14·1 answer
  • What did Adam and Eve look like?
    7·2 answers
  • What is LINUX?
    6·2 answers
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    7·1 answer
  • Choose all that apply.
    11·1 answer
  • What is the name of the arm that is attached to the read/write head?
    13·1 answer
  • Create an java application that will process 3-digit numbers as follows:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!