1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena55 [62]
1 year ago
14

the 4gl languages that enable nonprogrammers to use certain easily understood commands to search and generate reports from a dat

abase are called
Computers and Technology
1 answer:
Mademuasel [1]1 year ago
3 0

The 4gl languages that enable non-programmers to use certain easily understood commands to search and generate reports from a database are called <u>query</u>.

<h3>What is 4gl?</h3>

A computer programming language that is part of a class that is intended to improve upon third-generation programming languages (3GL) is known as a fourth-generation programming language (or 4GL).

Every generation of programming language strives to provide a greater level of abstraction of the internal workings of the computer hardware, making the language more user-friendly, potent, and adaptable.

Despite the fact that the definition of 4GL has evolved over time, it can still be characterized by the fact that it works more with large groups of data at once rather than concentrating on just bits and bytes.

The support for report generation, database management, mathematical optimization, GUI development, and web development may be found in languages that advertise themselves as 4GL. According to some academics, domain-specific languages include 4GLs as a subset.

Learn more about 4GL

brainly.com/question/9978575

#SPJ4

You might be interested in
A specially formatted encrypted message that validates the information the CA requires to issue a digital certificate is known a
Pavel [41]

Answer:

Certificate Signing Request(CSR).

Explanation:

Certificate Signing Request(CSR):- It is a message that is specially encrypted Which validates the information that is required by CA for the issuing of a digital certificate.

It is the first step towards getting your own SSL certificate.

So we conclude that the answer to this question is Certificate Signing Request (CSR).

5 0
3 years ago
List the three control problems associated with competingprocesses and briefly define each.
hjlf

Answer and explanation :

the three control problems associated with competing process are

  • MUTUAL EXCLUSION : We know that some resources are shareable and some are not shareable. which means only one process can access the resource at a time this type of resources are called critical resources this code can be access at only one process at a time. the other process if required to access should not be allowed
  • DEADLOCK: this hold the process without complete for example suppose there are two resources R1 and R2 and two process P1 and P2 and P1 use R1 and P2 use R2 but after some time when P1 needs R2 but R2 is not available as it is used by P2 so the all process will be on hold
  • STARVATION : when priorities are given to the process as high priorities and low priorities. And high priorities process always competing  then low priorities process have to wait for very long time this is called starvation
3 0
2 years ago
Write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). A function j
Lelu [443]

Answer:

see explaination

Explanation:

def words2number(s):

words = s.split()

numbers = ['zero', 'one', 'two', 'three', 'four', 'five', 'six', 'seven', 'eight', 'nine']

result = ""

for word in words:

if word in numbers:

result += str(numbers.index(word))

return result

4 0
3 years ago
Read 2 more answers
True or False? Wireless connections that use a higher frequency are faster but have a shorter range.
Rudiy27

Answer:

it's a True statement

6 0
3 years ago
FIRST PERSON TO FINISH GETS BRAINLIST
ivanzaharov [21]
1. D

2. D

3. ?

4. False

5. True

3 0
3 years ago
Other questions:
  • What is the Multiple Source Test
    15·2 answers
  • ll of the following are extra precautions you can take to secure a wireless network EXCEPT ________. Select one: A. turn on secu
    9·1 answer
  • ? Assessment
    12·1 answer
  • On his computer desktop, Rodney can see several different files, each immediately accessible. Because he is actively working on
    13·1 answer
  • Whoever answers first gets lots of points
    14·2 answers
  • Whats with the bot spamming customer care numbers...kinda annoying when im trying to help people.
    12·1 answer
  • Do pc players ever go outside?
    11·2 answers
  • Give me 4 examples of things to consider as a sound designer?<br> HURYYYYY IM TIMED
    11·1 answer
  • Which statement about intellectual property is true? (CSI-7.6) Group of answer choices It is okay to use code you find on the in
    14·1 answer
  • In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add someth
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!