1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
2 years ago
7

The way a particular application views the data from the database that the application uses is a.

Computers and Technology
1 answer:
masha68 [24]2 years ago
4 0

The way a particular application views the data from the database that the application uses is a sub-schema.

<h3>What is Database?</h3>

A Database may be defined as a process of collecting data and information that is principally assembled for quick search and recoupment by a computer.

The sub-schema is the reasoning elucidation of that section of the database which is applicable and accessible to a specific application. This type of database is common to two or more applications.

Therefore, the sub-schema is the way through which a particular application views the data from the database that the application uses.

To learn more about Database, refer to the link:

brainly.com/question/26096799

#SPJ4

You might be interested in
Automotive engine cylinder heads can be made of what?
pantera1 [17]

Answer:

automotive engine cylinder heads can be made of cast iron or aluminum

6 0
3 years ago
When approaching a bicyclist from the rear, you should slow down and
Veronika [31]

Answer:

A. Wait until it is safe to pass the bicyclist with at least three feet of clearance.

Explanation:

This is one of the traffic safety precautions to follow when driving especially in most parts of the United States of America.

Traffic safety guidelines are a list of Rules and instructions usually available in manuals and online made available by the government to its driving population in order to maintain law and order and prevent accidentals on the road. When effectively followed this guidelines can help to reduce accidents by a high Margin.

4 0
3 years ago
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
Nuetrik [128]

Answer:

Java

Explanation:

Java is a general-purpose programming language that is object-oriented, and has strong support for web development.

Therefore, one of the languages that a college sophomore majoring computer science learn is <u>Java,</u> an object-oriented programming language that is commonly used to write Web applications.

6 0
3 years ago
The ........ tag is used to create a link to another document​
Free_Kalibri [48]

Answer:

The "a" tag or <a></a> and its "h<u>r</u>ef" attribute <a href="#"></a>

Explanation:

In html there is only one way to create a link to an external source or a bookmark. The tag is created using the element <a>.

The attribute "href" is then added to describe the link of where it is to point to.

Example:

<a href="google.com">Go to Google</a>

While the text in between the tag describes what the link is about.

7 0
3 years ago
Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use? JavaScript H
irga5000 [103]

Answer:

Text Editor

Explanation:

What the question implies is that, what tool will she need to create the website.

And the answer is a text editor; this is so because the other three options are web development languages used in developing a website but the text editor is where she'll write her line of codes to create the required website poll.

Example of usable text editors are notepad and notepad++ etc.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • If reading or writing a cache line of size 64 bytes to Flash requires 2.56 μJ and DRAM requires 0.5 nJ, and if idle power consum
    9·1 answer
  • Linux would be a good example of?
    6·1 answer
  • Write a C++ program that computes an approximation of pi (the mathematical constant used in many trigonometric and calculus appl
    15·1 answer
  • You make an online purchase of a hooded sweatshirt with the logo of the Dallas Cowboys. The next time you log on, your screen ha
    13·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • What does this map key show
    12·1 answer
  • Find out about the different technological solutions available for interconnecting LANs to from larger networks such as wide are
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!