1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
4 years ago
14

What is a relational database management system and how does it relate to a database administrator?

Computers and Technology
1 answer:
nydimaria [60]4 years ago
6 0

Answer: A database management system tends to support administration, development, and use of the platforms. A Relation Database Management System (RDBMS) is referred to as a type of Database Management System (DBMS) that consists of a structure(row-based table) that tends to connect data elements and also involve functions that are supposed to maintain accuracy, security, consistency and integrity of the data.

You might be interested in
Which business application uses location information to provide a service and is designed to give mobile users instant access to
statuscvo [17]

Answer:

The correct answer to the following question will be "Location-based services".

Explanation:

Location-based services are resources that are delivered via a cell phone to take into consideration the geographical location of just the user. It usually include entertainment or data.

  • This uses the technology of GPS from a smartphone to detect the location or the position of an individual if that individual has expressed a preference-in to enable the service to do just that.
  • The app will classify its search down to a physical address during a smartphone user chooses-in, without any need for automatic input of the data.

Therefore, it's the right answer.

3 0
3 years ago
Who was responsible for unleashing the melissa computer virus
CaHeK987 [17]

Answer:

David L. Smith

Explanation:

Around March 26, 1999, the Melissa virus was released by David L. Smith

‘Melissa.A’ used social engineering techniques, since it came with the message “Here is the document you asked me for…  do not show it to anyone”. In just a few days, she starred in one of the most important cases of massive infection in history, causing damage of more than 80 million dollars to American companies. Companies like Microsoft, Intel and Lucent Technologies had to block their Internet connections due to its action.

How it Works

When opening a document infected with the ‘Melissa.A’, the virus creates an e-mail with the following features:

Subject: Important Message From “sender name”

Text: Here is that document you asked for … do not show anyone else

Attachments: a file with a DOC.

The recipients of this message were the first 50 addresses ‘Melissa.A’ found in the address book in Outlook. This was the first macro virus that used this technique, until this moment there hadn’t been a virus that affected users by sending a Word document within an email.

What Happened

The creator of ‘Melissa.A’, David L. Smith, pleaded guilty but said he did not expect such high economic damage. This malware was created in memory of a topless dancer in Florida with whom he had fallen in love with.

Smith was sentenced to 10 years in prison.

6 0
3 years ago
Which of the following is the most-polluting energy source?
ira [324]
The answer to your question is D. Coal.
7 0
4 years ago
Read 2 more answers
For any element in keysList with a value smaller than 40, print the corresponding value in itemsList, followed by a comma (no sp
givi [52]

Answer:

u look se33y yessir

Explanation:

......................................

7 0
3 years ago
You are an administrator for the Contoso Corporation. You have client software that receives its configuration from a shared fol
bija089 [108]
In order to make sure that the shared folder is accessible and the performance is high at all times, it would be best to house it on a secure file sharing/storage services, such as Box or Dropbox.
4 0
3 years ago
Other questions:
  • why is this message poor or ineffective ,Due to low profits,there will be no annual year-end bonus this year. We hope to have a
    13·2 answers
  • What are indexes in a database?
    14·1 answer
  • \Read the sentence.
    12·1 answer
  • Declare an array named tax rates of five elements of type double and initialize the elements (starting with the first) to the va
    12·1 answer
  • Eugenia told her coach that she was too tired to play. As soon as she said it, she realized that she had made a big mistake. She
    12·1 answer
  • To convince the server that a user is authentic, the authentication server creates a _________ that contains the user's ID and n
    13·1 answer
  • Who doesn't like reeses
    11·2 answers
  • 5.5 Learning Objective: To demonstrate that the student understands the definition of Big O. To demonstrate that the student und
    11·1 answer
  • When you're writing for mobile devices, use ________ to present the most important information first and provide successive laye
    13·1 answer
  • Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!