1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
4 years ago
6

Who developed the first commercially successful DBMS called Information Management system.

Computers and Technology
1 answer:
LenaWriter [7]4 years ago
3 0
Charles Bacheman invented the DBMS
You might be interested in
Consider the following code segment.
m_a_m_a [10]

Answer:

10 20                                                                                                                          

30 40                                                                                                                          

50 60

Explanation:

Given

The above code segment

Required

What is printed, if anything

To do this, we analyze the code line by line.

Line 1: The first line creates a 4 by 3 array named mat

Line 2: for (int[] row : mat) {  -> This creates row[] array which represents each row of array mat

Line 3: for (int j = 0; j < row.length; j += 2){ -> This iterates through the even indexed elements of the row array i.e. 0 and 2

Line 4: System.out.print(row[i] + " "); -> This prints the even indexed elements of the row array.

The even indexed elements are: 10, 20, 30, 40, 50 and 60

Line 5: System.out.println(); --> This prints a new line

8 0
3 years ago
A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An intern
AnnyKZ [126]

A band from the 1970s has reunited. They want to revive their careers, but they do not have the funding they once did. An international tour is not financially possible. The band needs to build renewed interest in their music and make a profit.

Which of the following would be the best decision for this band? \\

-----------------------------------------------------------------------------------------------------

Correct Answer:

<u><em>B) Plan a one-night reunion concert that will be broadcast live, online, and on cable, then sell recordings of the event.</em></u>

<u><em></em></u>

<em>Explanation:</em>

I got the answer correct on EDG2020.

<em />

4 0
3 years ago
Suggest a reason why it was constructed there?​
valina [46]
Can you post the work assigned so I can better understand?
6 0
3 years ago
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
Name 2 ways that body temperature can be taken.​
Zigmanuir [339]

Answer:

Under the armpit, which is called the axillary method, and also through mouth, which is called the oral method.

Explanation:

5 0
3 years ago
Other questions:
  • Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate
    10·2 answers
  • A device that produces a permanent human-readable text of graphic document.
    15·1 answer
  • If an employee who needs eye protection wears prescription lenses he or she should
    14·1 answer
  • Object Oriented Programming (OOP) allows us to handle complex code in an organized structure and break down the problem by model
    5·1 answer
  • What is the inflation rate if the price of a soda was $10 last year, but only $5 this year?
    5·1 answer
  • You're expecting visitors who will be demanding Mamet access Before they arrive, you can activate a Guest network that has its o
    11·1 answer
  • What is the difference between spyware and adware?
    8·2 answers
  • Jabari created new video game for his coding course. What is one way he should format his pseudocode?
    12·1 answer
  • Which is an example of a demand account
    10·1 answer
  • A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!