1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
3 years ago
6

How do most database users perform data searches?

Computers and Technology
1 answer:
defon3 years ago
7 0

Answer:

by using forms

Explanation:

Most of the database users perform the data searches by using the forms. A form can be used to enter, edit and display the data from the data source. Its a user interface in fact that fetches the data from the database. Reports have used the display the data for a certain type of user, and the viewing table does not look feasible to search from a very large database, and the databases are usually large. No calculation is required for searching the data, and we only need to write queries in the right syntax. Hence, here the correct option is by using forms.

You might be interested in
Explain program and programming with two examples of each<br>Help​
evablogger [386]

Answer:

program (noun) is executable software that runs on a computer. ... Examples of programs include Web browsers, word processors, e-mail clients, video games, and system utilities. These programs are often called applications, which can be used synonymously with "software programs." On Windows, programs typically have an .

7 0
3 years ago
With _____, the user simply tells the data mining software to uncover whatever patterns and relationships it can find in a data
Ket [755]

Answer:

D) Unsupervised Data mining

Explanation:

Unsupervised data mining also refered to as undirected data mining reveals hidden patterns in unlabeled data. In this method, there are no output variables to predict. The aim of an unsupervised data mining technique is to uncover patterns in data based on the relationship between the data points and each other

5 0
4 years ago
Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as:
icang [17]
~Hello there! ^_^

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as..?

Your answer: Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks are known as botnets.

Hope this helps~





3 0
4 years ago
State 4 &amp; circumstances under which warm<br>booting of a computer may be necessary​
Brums [2.3K]

Answer:

to close an open application

3 0
3 years ago
Why are 90% of questions not being answered im scrolling through the questions. Most are not being answered except the easy ques
Anna [14]
I actually have this problem all the time. Rarely any of my questions get answered and I see this happening to other people all the time. It's crazy. 
5 0
3 years ago
Read 2 more answers
Other questions:
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • Why is timbre an important musical element?
    7·2 answers
  • What does the group on option do?
    10·1 answer
  • There are no breakpoints in the "Access Customer Account" subpage however there is an error. What will happen if you choose to s
    11·1 answer
  • An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
    5·1 answer
  • You can rotate a selected graphic by dragging a ________ rotation handle
    13·1 answer
  • Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a
    15·1 answer
  • Which language paradigm interacts well with database systems in business environments that use SQL?
    12·1 answer
  • Help! I’ll mark you brainly! Please help me.
    15·1 answer
  • Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choi
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!