1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
15

Why can a failure in a database environment be more serious than an error in a nondatabase environment?

Computers and Technology
2 answers:
Elina [12.6K]3 years ago
5 0
Failure in a database environment is more serious then a non data base because if you lose important information you may not get it back and failure in a nondatabase environment the problem may be more easier to solve
Anestetic [448]3 years ago
3 0

Answer:

Failures in database environments can occur due to hardware failures, power failures and software/programming error.

Of these three errors, the non-database environment can survive the hardware failure due to recovery processes and the Software/programming error.

Explanation:

Databases are quite fragile when they hit a hardware failure if you try to recover them (Most of them have raw files that can only be read by certain types of Database Management Softwares) this does not exist in the Non-Database Scenario as most of these records are kept in files.

Software failures can occur when a wrong query is used to retrieve data from a DBMS. This can be frustrating except the user gets the right query.

You might be interested in
Is the conversation recorded when the party answers or when they dial the number?
Len [333]
I think it’s when the party answers
3 0
3 years ago
What two items must be given to the socket function in order to create a socket object? A) The socket type that will be used. B)
Yuki888 [10]

Answer:

The correct option are:-

a) The socket type that will be used

d) The socket family that will be used  

Explanation:

The socket() method generates the unbound socket in a networking domain and returns a descriptor of the register, which can be used in subsequent socket function calls.

The socket() method takes three arguments:  

Domain:- The domain for which a socket is to be built is defined.

Type:- The socket type to be generated is defined.

Protocol:- It specifies a common socket protocol to use. The protocol setting of 0 causes socket() to use a default uninstalled protocol that is suitable for the socket type requested.

5 0
3 years ago
Lisa manages incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
kari74 [83]

Answer:

The answer is C) SQL Injection

Explanation:

Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.

SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.

From the above brief definition; it is seen that the answer is C) SQL Injection.

3 0
3 years ago
Can someone please answer this for me ? What is data centre virtualization?
castortr0y [4]
Data center virtualization is the process of designing, developing and deploying a data center on virtualization and cloud computing technologies. It primarily enables virtualizing physical servers in a data center facility along with storage, networking and other infrastructure devices and equipment.
3 0
3 years ago
Please help! No one is answering these correctly!
nataly862011 [7]

Answer:

it is either c or d

I'm 99.5% sure it is C tho

8 0
3 years ago
Other questions:
  • The text discusses three approaches to combining overall cost leadership and differentiation competitive advantages. Which of th
    10·1 answer
  • My computer keeps shutting down I've tried to completely wipe the memory but it didn't work do you have any ideas how to fix it
    7·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • After adding an email account, how do you switch accounts to send a message?
    10·2 answers
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • Select the correct answer from each drop-down menu.
    6·1 answer
  • A circuit contains three resistors connected in parallel. The value of R1 is 2 K , the value or R2 is 6 K , and the value of R3
    5·1 answer
  • Help me or I'll go insane I've 6x already I'm about to lose it!!!!
    11·2 answers
  • Which of the following is not a storage medium?
    14·2 answers
  • What is output?<br> x = 2<br> y = 3<br> print (x * y + 2)<br> 4<br> 2<br> 8<br> 10
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!