1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
5

Metadata is data about the data, and it is the necessary information needed to understand and use data effectively. Where would

the metadata about Customer and Product tables be stored?
Computers and Technology
1 answer:
Simora [160]3 years ago
5 0

Answer:

The correct answer to the following question will be Option C (Data dictionary).

Explanation:

In this question, the option is missing. The option for the given question is given below :

A) Database Management system

B) Database

C) Data dictionary

D) Entity-relationship Diagram

Data Dictionary:

A data dictionary, as described in the IBM Computing Dictionary, is a "git repository of data information such as context, relationships with other records, origin, use, and structure." Oracle describes this as a set of metadata tables. It gives the definition of metadata which is nothing else data about data.

  • Option A and Option B do not define metadata that's why this option is not fruitful.
  • Option D is the entity-relationship diagram it gives the diagrammatic representation between the entity it does not defines metadata that's why this option is not fruitful.

Hence Option C i. e "Data dictionary" is the correct answer.

You might be interested in
Write down a pair of integers whose sum is​ 0
Tems11 [23]

Answer:

-1 ans +2 are the pair of integers whose sum is 0.

3 0
4 years ago
When a linke chain contain nodes that reference both the next node and the previous node it is called a(n)
ch4aika [34]
A. Two way linked chain
4 0
3 years ago
Which of the following are all involved in the evaluation of the presentation of a speech?
ikadub [295]

Answer:

C.

Explanation:

The elements involved in the evaluation of the presentation of a speech includes visual aids, vocal technique, and body language.

Adding vivid pictures in the presentation makes it graphic and proficient. The visual aids in presentation also provides the succinct and clear meaning of the message to the reader.

The vocal technique is another element that adds value in presentation. A speaker's confidence is reflected through his/her tone. It is the speaker's voice that becomes an influential tool that draws the audience's attention.

Body language, like vocal technique, helps in effective delivering of the speech. Body language is a non-verbal form of communicatin that communicates a lot to the audience than one can imagine.

Therefore, option C is correct.

6 0
3 years ago
how risk can impact each of the seven domains of a typical IT infrastructure: User, Workstation, Local Area Network (LAN), Local
juin [17]

Answer and Explanation:

User Domain:

Risk

  • User can destroy the data and delete all User can find checked and use a password to delete all the work User can insert the USB flash and Infected CD.

Work Station Domain:

  • The workstation domain has some software vulnerability that connects remotely and steals data.
  • A workstation can fail because of lost data.

LAN domain

  • A worm can spread and infect the computer.
  • LAN have some known software vulnerability.
  • An unauthorized access of the organization workstation in

LAN WAN domain

  • LAN WAN domain that consists of internet and semi-private lines Service providers have major network problems.
  • Server can receive the DOS File Transfer protocol can allow uploaded illegal software.

LAN/WAN Domain

  • The boundary between the trusted and untrusted zones.
  • Hacker can penetrate the IT infrastructure and gain access.
  • Week ingress and egress filtering performance.
  • A firewall with the ports open can allow access to the internet.

System Storage Domain:

  • A fire can destroy the data DOC can cripple the organization's email.
  • A database server can be attacked by the injection of SQL and corrupting data.

Remote Access Domain

  • Communication circuit outage the connections
  • Remote communication from the office can be unsecured VPN tunneling between the remote computer and router
5 0
3 years ago
Java Eclipse homework. I need help coding this
erik [133]
What issues are u having... what part is challenging you
3 0
3 years ago
Other questions:
  • Hands-on Assignment To these assignments, refer to the tables in the JustLee Books database. Generate and test two SQL queries f
    10·1 answer
  • REEEEEEE I STILL NEED MORE AESTHETIC USERNAMES TO GO OFF OF PWEASE HELP IMA HAVE A PANIC ATTACK!!!... next post ima do a vote :&
    13·1 answer
  • When studying an information system, illustrations of actual documents should be collected using a process called _____.
    12·1 answer
  • 1.Customer service is assistance provided by a company to the people who buy or use its products or services.
    13·2 answers
  • Who like fortnite??????
    12·2 answers
  • What are reserved words in C programming?
    9·1 answer
  • A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.
    9·1 answer
  • A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is loca
    15·1 answer
  • Several programmers write individual code modules that are used for different processes in a vehicle. Individual tests have alre
    13·1 answer
  • Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!