1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
15

Why can a failure in a database environment be more serious than an error in a nondatabase environment?

Computers and Technology
2 answers:
Elina [12.6K]3 years ago
5 0
Failure in a database environment is more serious then a non data base because if you lose important information you may not get it back and failure in a nondatabase environment the problem may be more easier to solve
Anestetic [448]3 years ago
3 0

Answer:

Failures in database environments can occur due to hardware failures, power failures and software/programming error.

Of these three errors, the non-database environment can survive the hardware failure due to recovery processes and the Software/programming error.

Explanation:

Databases are quite fragile when they hit a hardware failure if you try to recover them (Most of them have raw files that can only be read by certain types of Database Management Softwares) this does not exist in the Non-Database Scenario as most of these records are kept in files.

Software failures can occur when a wrong query is used to retrieve data from a DBMS. This can be frustrating except the user gets the right query.

You might be interested in
An example of cooler red is
BARSIC [14]

apple, stop sign, fire truck, stop light... ect

6 0
3 years ago
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. manipulation
Ira Lisetskai [31]

Answer:

definition

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Hence, the data definition component of a database management system (DBMS) is used to create and maintain the data dictionary.

6 0
3 years ago
Limitations of systems analysis and design​
Sonja [21]

Answer:

<h3 />

Explanation:

<h3>Although System analysis offers an extensive range of benefits it might also have some disadvantages. One of the main disadvantages which is mostly overlooked is the risk of too much analysing which may be costly and time consuming. It is therefore part of the analyst's job to find the right balance.</h3>
6 0
3 years ago
What is the easiest way to beat all of the fnaf games without getting killed and beating all of the nights?
MrRa [10]

Answer:

If you want the game to be "hard" be paranoid. If you are not scared, this game is simple. All you have to do is check your camera to pirate's cove to see if foxy is there. Otherwise, check the halls on your left and right. When Bonnie and/or Chica come, quickly close your doors and wait till they go away. Then, on night five, check the stage to make sure freddy has not moved. Night 5+ is the only real challenge.

Explanation:

My Strategy

Rythm is essential to surviving all the nights at Freddy Fazbears. Here is what I do.

First, check the light on the left.

If anyone is there close the door, or keep the door shut

If not, or after you have closed the door, move on to the next step.

Then, close the right door*.

Check the camera to make sure foxy has not moved.

If Foxy has moved, quickly shut the right door and check camera 2A. When your are pulled out of your camera, return to your camera and check on Foxy.

Check the right hall light.

If anyone is there close the door, or keep the door shut.

If no one is there, or you have the door shut, repeat all of these steps

5 0
3 years ago
Read 2 more answers
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of these decisions would u most likely make on ur own
    8·2 answers
  • Name the months that have 30 days​
    6·2 answers
  • How can you tell the difference between subnet addresses and interface addresses?
    13·1 answer
  • True / False<br> General purpose registers can be read and written by ML programs
    10·1 answer
  • Inserting merge fields in the letter<br>steps required <br>plz ​
    11·2 answers
  • The author mentions several challenges facing the world, including poverty and climate change. How might big data help us solve
    14·2 answers
  • Anyone wanna talk im 13 eboy single
    11·2 answers
  • Adios brainly, you were sh.t sometimes, but you had your moments, wont be posting that much take my points away i d c
    6·2 answers
  • Does anyone know how to write this right? This is for a coding class and I’m super confused on it.
    13·1 answer
  • What is an Array? 20 POINTS!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!