1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ira [324]
3 years ago
11

Which of the following is ture?

Computers and Technology
1 answer:
serious [3.7K]3 years ago
5 0

answer: if a list needs to be updated, the entire program must be rewritten.

You might be interested in
A data mart is the operational database for the company. group of answer choices true false
netineya [11]

The statement 'a data mart is the operational database for the company' is true.

We can define a data mart as a  subject-oriented database that focuses on a particular area in an organization.

It is through data mart that the employees of a company can access data faster. Data mart, functioning as the operational database, helps employees as they do not have to manually add all the data again. Also, any piece of data needed by an employee can easily be accessed through the data mart of the company.

One of the advantages of using data mart is that it eradicates human-made errors which can arise if data is added manually by an employee.

To learn more about data mart, click here:

brainly.com/question/25013185

#SPJ4

8 0
2 years ago
When considering the typical characteristics of a server, how is the server optimized in relation to applications?
VLD [36.1K]

Answer: Server are optimized so that they can work efficiently and improve their performance while working. Application server optimization mechanism can be used for optimizing the server with respect to the application.

Some of the techniques used in the application server optimization are as follows:-

  • Load balancing- which helps in upgrading throughput ,improves the time of response, enhance the bandwidth of network etc.
  • Fail-over management- it is used for decrement of latency, balancing the server, increasing the availability of network and it resources etc.

3 0
3 years ago
Computers and technology<br> Help 10 Points!!!!
jonny [76]
Hi!

The answers are:
For the bookmark one, it is A. Below address bar
For the edge printing one, it is again A. Options
For the last one, it is C. Internet Explorer

-ASIAX ·<span>Frequent Answerer</span>
3 0
4 years ago
Write a short note on "History of WWW" (word limit = 100-150 words)​
mihalych1998 [28]

Explanation:

it looks like there aren't many great matches for your search

Tip Try using words that might appear on the page that you’re looking for. For example, 'cake recipes' instead of 'how to make a cake'.

I hope you help

4 0
3 years ago
Read 2 more answers
True and false 1. Trace topology is also referred to as tree bus topology. ​
algol13

Answer:

Trace topology is also referred to as tree bus topology.

Explanation:

6 0
2 years ago
Other questions:
  • ​Case-Based Critical Thinking Questions​Case 9-1Melissa, a computer science engineering student, is learning the basics of progr
    11·1 answer
  • Which of the following is not a type of Internet Job Board? Options Resume Blaster Professional Association Target Applicants We
    8·1 answer
  • . In Laissez-faire Styleof Group Leadership, Members of the group are not given help inactivity plans by the leader only when it
    11·1 answer
  • What feature is not included in most DTP programs?
    9·1 answer
  • Universal Containers has the following requirements:• Enable VIP community access once a customer has reached $1 million in reve
    14·1 answer
  • Which would be included in a SaaS platform?<br><br> A.data link<br> B.IaaS<br> C.Java<br> D.vb.net
    5·1 answer
  • How do you change the font in html?<br>&lt;______&gt;google sans"google sans font"&lt;/______&gt;
    8·1 answer
  • How did the internet originate??​
    12·1 answer
  • Steve is happy today but he ____ yesterday​
    7·2 answers
  • A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!