1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Iteru [2.4K]
3 years ago
5

The logical view of a database system refers tohow a user or programmer conceptually organizes and understands the data. how the

DBMS accesses data for a certain application program. how and where the data are physically arranged and stored. how master files store data values used by more than one application program.
Computers and Technology
1 answer:
Leona [35]3 years ago
7 0

Answer: How a user or programmer conceptually organizes and understands the data.

Explanation:

  • The logical view is one of the type of view in the database system that provide some logical concept to the user of the database management system which include the state diagram, UML and the class diagram.
  • In the database system, each user posses their own logical view on the basis of the specific task and function and it also helps in maintain the database system in an organization.    

According too the given question, the logical view is basically refers to the programmers or any user is typically understand the given data and conceptually organize the data in logical manner in the database management system.

You might be interested in
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. zombie
lozanna [386]
<span>A rootkit allows a hacker to gain privileged or 'root' access to a computer. A rootkit is designed to actively hide its presence so that the attacker can continue having full access for as long as they need to carry out their intended malicious actions without being detected.</span>
6 0
4 years ago
What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
Salsk061 [2.6K]

Answer:

Explanation:

These will be shared with the public because websites like haveibeenpwned share what data leaks that your password has appeared on. It is inevitable that these hacks will continue to occur as long as security can be breached.

6 0
2 years ago
Though there are no specific federal laws for cyberbullying, in some cases cyberbullying
inessss [21]
Cyberbullying overlaps with discriminatory harassment
7 0
3 years ago
In your aws vpc, you need to add a new subnet that will allow you to host a total of 20 ec2 instances. which ipv4 cidr block wou
Valentin [98]

172.0.0.0/27

If you're looking to add a new subnet to your AWS VPC that will allow you to host a total of 20 EC2 instances, you'll want to use the 172.0.0.0/27 IPv4 CIDR block. This will give you the necessary IP addresses to accommodate your desired instance count. To add the subnet, simply follow the instructions in the AWS console.

Learn more about AWS VPC here

brainly.com/question/15970464

#SPJ4

7 0
2 years ago
What is multimedia computer system​
ivann1987 [24]

A Multimedia can be defined as any application that combines text with graphics, animation, audio, video, and/or virtual reality. Multimedia systems are used for security to keep intruders out of a system and for the protection of stored documents

4 0
3 years ago
Other questions:
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • It's inventiveness, uncertainty futuristic ideas typically deal with science and technology.what is it?
    14·1 answer
  • Being technologically literate requires being able to ______.
    11·2 answers
  • Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. Tr
    7·1 answer
  • Which bus slot provides highest video performance​
    13·1 answer
  • Bcr is an out put device true or false​
    13·2 answers
  • Imagine you were trying to explain the Russian hacking incident to a child (around 10 years of age) and why it was unethical. Cr
    6·1 answer
  • Write this multiplacation statement as repeated addition 5/6 x 3​
    6·1 answer
  • There are a wide variety of nonsampling errors that can occur during data collection including the first type, ________.
    7·1 answer
  • What does intelligent route planner show to owners when they have entered a destination into the navigation system in 2023 ariya
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!