1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolbaska11 [484]
2 years ago
9

_____ refers to software for creating, maintaining, and manipulating data. group of answer choices extranet rom internet 2 ram d

bms
Computers and Technology
1 answer:
Sliva [168]2 years ago
5 0

Database management system (DBMS) refers to software for creating, maintaining, and manipulating data.

In the field of software engineering, a database management system (DBMS) can be described as a software whose function is to properly manage a database. Any kind of data in a database can be created, changed, or retrieved through the database management system (DBMS).

It is through the database management system (DBMS) that data is created, gets secured and its integrity is maintained. Through the database management system (DBMS), a certain piece of data can be assessed by various people at the same time from different locations.

Some examples of database management systems are columnar DBMS, NoSQL DBMS, and in-memory DBMS.

To learn more about the database management system (DBMS), click here:

brainly.com/question/19089364

#SPJ4

You might be interested in
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
2. As you have learned, ironically, a large part of sound production involves visual perception. How easy or difficult did you f
Alex787 [66]

Answer: it is very easy to work with programs such as audacity, they are real game changers. Also, they are very helpful for editing and recording audio. They could make audacity’s auto tune more beginner friendly

3 0
2 years ago
Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
topjm [15]

Answer:

class PersonInfo:

   def __init__(self):

       self.num_kids = 0

   def inc_num_kids(self):

       self.num_kids += 1

person1 = PersonInfo()

print('Kids:', person1.num_kids)

person1.inc_num_kids()

print('New baby, kids now:', person1.num_kids)

Explanation:

Line 1 of the code, we define the class PersonInfo. Line 3 of the code is the function that will increment the member data num_kids.

4 0
3 years ago
"As part of integrating your solution your client indicates that they have certain technologies enabled on their network that al
erastovalidia [21]

Answer:

quality of service

Explanation:

6 0
3 years ago
In which case will the linear search return the lowest value faster than the<br> binary search?
Sveta_85 [38]

Answer:

A linear search is one that scans every record/file until it discovers the value being searched for.

Binary search, on the other hand, is also known as <em>Logarithmic search</em>. It is used to locate the position of a value inside an array that has already been sorted.  

The linear search will return the lowest value faster than the binary search when small arrays are involved.

This will only be feasible when the array is sorted prior.

Cheers!

5 0
3 years ago
Other questions:
  • A switch is a central network device that connects network nodes such as workstations and servers in a physical ____ topology
    14·1 answer
  • Which one of the following statements is correct? a. Web browsers cannot function without cookies. b. Cookies are text files and
    9·1 answer
  • Which group on the Home Tab allows you to add shapes to a PowerPoint slide?
    9·2 answers
  • Which email client feature allows you to store the names and information of people you contact frequently?
    5·1 answer
  • In a meeting, Juan hears someone say a product mix is "wide." What does
    13·1 answer
  • What is the effect of flattening layers in image editing?
    14·2 answers
  • What are some catchy names for computer basics that you would put on a childrens poster?
    9·1 answer
  • Which of the following shows the correct order of inventions that helped the first computers make calculations?
    9·1 answer
  • A. In I/O interation between OS and devices, describe how hybrid mechanism works?
    6·1 answer
  • How can we search person in brainly for sending request of friend
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!