In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storage cost, and security are key considerations is True.
True
<u>Explanation:</u>
If database is centralized (DBMS) as database administrator has kept database server on by 24 X 7. If an organization office is spread over many countries, centralized the database is good advice.
Database administration has monitored the database access in and out transaction on the database.
Since it is centralized database, it is cost effective rather providing database server in office in organizations and later it synching to centralized database on period schedule or end user ( IT department) in each office has to execute the period schedule then their requirements
Response time from and to on centralized database is count how fast the system operates the database.
Since it is database is centralized storage cost is reduces as expenses in the organization.
Security on centralize database server is very important to protect from hackers.
Answer:
computer is an electronic device
Explanation:
computer have many advantages like
it help us to find answer questions
it helps us to employing
it gives some knowledge like how to play games
it help me to talk with friends
Answer: A. to add comments to Lines of code
Explanation:
Answer:
Her computer is producing thermal energy, not heat.
Explanation:
Shelly informs her friend that she wants to repair her system because it has generated a lot of heat and therefore is smoking. Her device produces thermal energy but not heat because when she's working continuously and her system's CPU inside any blocked area at that time electricity pass through the CPU and blocked inside then it producing the thermal energy.
Answer: Passive
Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .
It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.