breannagrd83681 breannagrd83681
  • 24-01-2024
  • Computers and Technology
contestada

What is the technique where all updates to a database are recorded with who, when, and how information?

a) Encryption
b) Compression
c) Logging
d) Indexing

Respuesta :

Otras preguntas

What is the difference between –4 and 6?
Which of the following is an example of an imperative sentence A. That is absolutely ridiculous! B. What time will Stephanie want to leave? C. P
true or false, in the late 15oo's spanish pirates such as Sir Francis Drake had success stealing English treasure
Using which social engineering principle might an attacker impersonate a ceo of a company?
how do teenagers typically use code in e-mails, text messages, and instant messages
According to henry grady what would characterize the new south
Ehhhhh please ! Help
A regular pentagon was a perimeter of 21" is dilated by a scale factor of 5/3 to create a new pentagon what is the perimeter of the new pentagon
Please help. Fast and thank you
Who is the only elected official to serve in two branches of government and who is this person today?