1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ra1l [238]
3 years ago
14

what is the software that controls the storage, retrieval and manipulation of database stored in a database

Computers and Technology
1 answer:
irga5000 [103]3 years ago
5 0
A database management system (DBMS) is the software which controls the storage, retrieval, deletion, security, and integrity of data within a database.
You might be interested in
By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducti
castortr0y [4]

Answer:

The correct option to the following question is option (B). e-business.

Explanation:

E-business is stands for the Electronic business.

E-business is the business which is conduct by the uses of the internet, Web, extranet or intranet, etc.

E-business is also known as the online business where online transactions take place.

E-business facilitates our customers that the selling and the buying of the goods between the consumers and the merchants.

7 0
4 years ago
What is the answer to this A term career is usually applied to a Someone please HEEEEEEEEEELP MEEEEEEE. THX
spin [16.1K]

Answer:

Position that allows for professional growth and advancement

The term career is used in a number of ways but is usually applied to means the same thing: a position that allows for professional growth and advancement. It relates to a person’s occupation or profession and his journey of life, learning (training or formal education)  and work.  

4 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Why would a programmer want to overload operators rather than use regular member functions to perform similar operations?
Harlamova29_29 [7]
The Programmer wants to overload operators rather than use a regular member of the functions to perform similar operations because of two main reasons:
1. For easy and simpler definition of the functions. There would be one pointer who will call the function every time is needed in the program.
2. For easier comparisons of parameters.
4 0
4 years ago
Which of the following statements is not true about the TCP opening and closing of connections?
lubasha [3.4K]

Answer:  c.)

Explanation:

The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.

It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".

The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.

If one process set the FIN bit to "1", this means that it has no more data to send.

3 0
4 years ago
Other questions:
  • A popular Voice over Internet Protocol (VoIP) service is ________.
    12·1 answer
  • T.J. wants to send a friend a file with a funny dancing cat. Which file format should T.J. use?
    13·2 answers
  • A jeweler designing a pin has decided to use five stones chosen from diamonds, rubies, and emeralds. In how many ways can the st
    9·1 answer
  • Instructions:Select the correct answer.
    9·1 answer
  • Difference between switch case and if else statement.​
    11·1 answer
  • What specific tool allows you to create GPOs, view a GPO's settings, link and unlink GPOs with containers, and manage the inheri
    10·1 answer
  • To print the number of elements in the array named ar, you can write :
    10·1 answer
  • Paravirtualization is ideal for
    9·1 answer
  • What are the specifications of mine shaft head gear​
    11·2 answers
  • If non-series-rated overcurrent devices (standard molded-case circuit breakers) are to be installed in the main switchboard, bre
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!