1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
3 years ago
14

what is the software that controls the storage, retrieval and manipulation of database stored in a database

Computers and Technology
1 answer:
irga5000 [103]3 years ago
5 0
A database management system (DBMS) is the software which controls the storage, retrieval, deletion, security, and integrity of data within a database.
You might be interested in
Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?
Aleks04 [339]

Answer:

computer programming

Explanation:

says the answer in the question

5 0
3 years ago
Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
viva [34]

Answer:

false

even though you have paid for it , you still didn't write it by yourself, there for it will still be seen as plagiarism.......hope this helps

4 0
3 years ago
Select the correct answer.
ipn [44]

Answer:

I'm guessing D? i hope its right

5 0
2 years ago
Read 2 more answers
A technician is training a new hire on sealing an RJ-45 connector to the end of an Ethernet cable. Which tool is the technician
Aleonysh [2.5K]

<em>The answer is Crimper. </em>

<em> </em>

<em>Crimper is a networking device that would allow RJ-45 pins to get attached to UTP(Unshielded Twister Pair), CATs (Category Ns) and STPs (Shielded Twisted Pair) Cables. These are common type of cables used in computer networking. A crimper looks like a pliers only it has narrow ends with a hole where you would put RJ-45 devices together with the cables. In order to make the cable hold on to the RJ-45, the two hands must be squeezed together with an exact force (not too much force). Once the crimper made a sound, that means, your RJ-45 is now locked with the cables inside.  </em>

<em> </em>

<em>You must be very careful when using this device. Sometimes crimpers has blades that could peel off cables or cut them for alignment and proper attachments. A pair of gloves and googles are also advisable to wear when you use this device for safety measures.</em>

8 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
Other questions:
  • Write a statement that reads 5 successive integers into these variables that have already been declared : x1 x2x3x4 x5. Then wri
    7·1 answer
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    7·1 answer
  • If you were to mount a nonmetallic box to the front of a stud, what type of bracket should the box have? A. FP B. BP C. NP D. JP
    13·1 answer
  • Rachel needs to include a new organizational chart in her project. Which type of illustration should she use?: *
    11·1 answer
  • You are the IT Administrator for a small corporate network. Until now, the network has consisted only of workstations accessing
    6·1 answer
  • 3. Describe at least 3 nonprice competition strategies a company could use to convince customers that its product is better than
    5·2 answers
  • The sequence's insert member function normally puts a new item before the current item. What should insert do if there is no cur
    9·1 answer
  • Write a method that accepts an integer argument and returns the sum of all the integers from 1 up to (and including) the number
    14·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
  • What can you do to make sure no one outside your company can gain access to its wireless network?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!