Answer:
t
r
u
e
n .....................................................
Answer: The working of the CPU is defined as a three-step process. First, an instruction is fetched from memory. Second, the instruction is decoded and the processor figures out what it's being told to do. Third, the instruction is executed and an operation is performed.
Explanation: Hope this helps
Answer:
Domain integrity constraint and Entity integrity constraint
Explanation:
Data integrity constraints protect the quality of data by ensuring data doesn't lose its integrity, validity, or consistency when there is update to data. Data integrity constraints are rules applied to table columns in DBMS systems to prevent any unintentional damage to data. There are four types of data integrity constraints: domain integrity constraint, entity integrity constraint, referential integrity constraint, and key constraint.
Domain integrity constraint applies rules to protect against the values or attributes in the table column.
Entity integrity constraint applies rules to protect the uniqueness of rows in the table.
<span>True. When users make changes to the database, such as creating, altering, or dropping tables or creating or dropping indexes, the DBMS updates the system catalog automatically.</span>