1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
2 years ago
12

_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a

field, constraints, and access methods.
Computers and Technology
1 answer:
meriva2 years ago
5 0

Answer:

Data base administrator

Explanation:

The data base administrator is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field , constraints and access methods. Database is structured from of data sets.  

The data in database use to come from different sources that data must have some boundaries. Database administrator is a part of DBMS. The authorized DBA is responsible for the integrity of data and keeping the data in good manner so at the time of need the data could be accessed rightly. Storage of data has to be  done in a way that at time of use or at the time of retrieval the data must be accessed frequently and easily.  

Database administrator is responsible to put constraint on the database, for example a person could enter how many digits or alphabets in the required fields or records. Otherwise user could enter irrelevant and lengthy data in the fields so it would be hard to manage data on server due to shortage of the memory. By putting such constraints the size of data could be managed and relevant data could be saved. Secondly, constraints use to be put for security purpose to keep information confidential and secure the  certain constraints are mandatory and the data base administrator is responsible for such constraints.

Once the user use to store data on database the data safety and integrity is most important for them. So that DBA will arrange the data in organised form which will give quick access and data length will be managed properly so user could not enter lengthy data to full the repository. DBA put security constraint as well for the satisfaction of user and secure use of the database.

So we could say that dba is most important part of DBMS of any organization.

You might be interested in
Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
vichka [17]

Answer:

CCSA

Explanation:

CCSA is "Checkpoint Certified Security Administrator". This certification is best suited for Jonas.

8 0
2 years ago
The way of placing text between the margins of a place is called ​
VashaNatasha [74]

Vertical alignment determines the position of the text within a section of a document relative to the top and bottom margins, and is often used to create a cover page.

7 0
3 years ago
__________ are variables that store data for direct or indirect processing. A IPO DiagramsB Flow chartsC Data structuresD Progra
likoan [24]
C. Data structures






---------------------------------
7 0
2 years ago
Insurance can help you:
Blababa [14]
No it can not .............
3 0
3 years ago
Computer ethis are crime done using computer technology (true )and(false)​
aliya0001 [1]

computer ethis are crime done using computer technology (true )and(false)

answer- true

8 0
2 years ago
Other questions:
  • Create and apply a css class named bigblue, which selects a large, blue-colored font.
    11·1 answer
  • A(n) __________ window is an open window hidden from view but that can be displayed quickly by clicking the window's program but
    7·1 answer
  • In Microsoft Windows, which of the following typically happens by default when a file is "double-clicked"
    10·2 answers
  • What is a independent variable
    11·1 answer
  • What are the coordinates of (3 comma space 8 )relative to the basis open curly brackets space (1 comma space 1 )comma space (0 c
    15·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was runn
    9·1 answer
  • Haley is responsible for checking the web server utilization. Which things should she review while checking the server utilizati
    8·2 answers
  • WILL GIVE BRAINLIEST! 20 POINTS! PLZ HELP!
    14·2 answers
  • ________ take advantage of vulnerabilities in software. Group of answer choices Blended threats Bots Trojan horses Direct-propag
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!