1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gelneren [198K]
2 years ago
6

Which of the following statements is correct? User data cannot be combined and shared among authorized users. In a nondatabase,

file-oriented environment, data is often partitioned into several disjointed systems with each system having its own collection of files. Database users should not have access to the same information. Controlling redundancy is easier with the nondatabase approach.
Computers and Technology
1 answer:
ser-zykov [4K]2 years ago
4 0

Answer:c) In a nondatabase, file-oriented environment, data is often partitioned into several disjointed systems with each system having its own collection of files.

Explanation:

You might be interested in
Which of the following is defined as the elastic leasing of pooled computer resource over the Internet? 1) Broadband 2) Wiki 3)
garri49 [273]

The cloud is defined as the elastic leasing of pooled computer resource over the Internet.

Many companies currently use the cloud to store their information and infrastructure instead of leaving it on the physical computer. As time passes, more companies have continuously started to store their information on the cloud. Predictions show that in the future, nearly all companies will use this to store information.

7 0
3 years ago
If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attem
Arada [10]

Explanation:

Both station will retract their data. They will wait a random amount of time before sending out data again. This lessens the chance of collision again.

8 0
1 year ago
From your computer you are able to establish a telnet connection to a remote host but a traceroute to the host IP address result
Tanya [424]

Mostly firewalls may protect trace route to the host IP address.

<u>Explanation:</u>

When telnet has established the connection to a remote host. Then kindly check the host IP address and their gateway settings.  

If any resident firewall such as antivirus is stopping the ping method or gate way firewall is protecting both ends during trace route. Once the connection is established don’t worry about trace route on host IP  address.

Kindly check where the disconnections happens during the trace route.  in case it happens in between then they're stability on the connection issue which should be solved immediately.

8 0
2 years ago
A biologic reaction is produced by 4 Gyt of a test radiation. It takes 16 Gyt of 250-kVp x-rays to produce the same biologic rea
Shalnov [3]

Answer:

4

Explanation:

Relative Biological Effectiveness (RBE) =

Standard Radiation dose / Test Radiation dose

for achieving the same biological effect.

The absorbed radiation dose is measured in units of Gyt(Gray in tissue).

In the given scenario, Standard radiation dose of 250 KVp X-rays = 16 Gyt

Corresponding Test Radiation dose = 4 Gyt

Therefore, Relative Biological Effectiveness = 16/4 = 4

7 0
3 years ago
Jasmine plays a game on her computer screen. A moving balloon appears on the screen, and she has to pop the balloon by clicking
Elena-2011 [213]
Please find the answer as attachment.

4 0
2 years ago
Other questions:
  • Which of these is outside the scope of an art director's responsibility?
    12·2 answers
  • My computer have black spots and line
    7·2 answers
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • The document responsible for describing the type of data stored in the database is called the:
    5·1 answer
  • Which is most harmful computer virus define​
    15·1 answer
  • When you write Click a picture in a word processing program which actions can you choose to perform on the image
    6·1 answer
  • Your employer is opening a new location, and the IT director has assigned you the task of calculating the subnet numbers for the
    14·1 answer
  • __________ intelligence is an approach to boundary spanning which results from using sophisticated software to search through in
    15·1 answer
  • PLEASE HELP
    5·1 answer
  • Will give brainliest
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!