1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Roman55 [17]
3 years ago
12

_____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a

field, constraints, and access methods.
Computers and Technology
1 answer:
meriva3 years ago
5 0

Answer:

Data base administrator

Explanation:

The data base administrator is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a field , constraints and access methods. Database is structured from of data sets.  

The data in database use to come from different sources that data must have some boundaries. Database administrator is a part of DBMS. The authorized DBA is responsible for the integrity of data and keeping the data in good manner so at the time of need the data could be accessed rightly. Storage of data has to be  done in a way that at time of use or at the time of retrieval the data must be accessed frequently and easily.  

Database administrator is responsible to put constraint on the database, for example a person could enter how many digits or alphabets in the required fields or records. Otherwise user could enter irrelevant and lengthy data in the fields so it would be hard to manage data on server due to shortage of the memory. By putting such constraints the size of data could be managed and relevant data could be saved. Secondly, constraints use to be put for security purpose to keep information confidential and secure the  certain constraints are mandatory and the data base administrator is responsible for such constraints.

Once the user use to store data on database the data safety and integrity is most important for them. So that DBA will arrange the data in organised form which will give quick access and data length will be managed properly so user could not enter lengthy data to full the repository. DBA put security constraint as well for the satisfaction of user and secure use of the database.

So we could say that dba is most important part of DBMS of any organization.

You might be interested in
True or False<br><br> The signing of Act 26 made Cyber Harassment of a Child a crime.
Levart [38]
True, online bullying is a crime and can be fined or arrested for it.
3 0
3 years ago
Join my discord server! CODE IS (CebjBXN)​
11Alexandr11 [23.1K]

Answer:

sure

Explanation:

7 0
3 years ago
Read 2 more answers
Every application program has a _______________ segment
Natali5045456 [20]
"Main" goes in the blank. For example in C++ all of your code goes in the main function.
4 0
3 years ago
A group of accountants encrypt the emails they send to your company because they contain highly sensitive financial information.
ratelena [41]

Answer:

a) Generate a new public and private key

Explanation:

You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.

The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.

Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.

8 0
3 years ago
Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
Sphinxa [80]

Answer:

Encapsulating Security Payload (ESP)

Explanation:

Encapsulating Security Payload is also known as ESP, it is a protocol that exists within IPSec, it helps in determining the authentication, integrity and how confidential network pack data / Payload in IPV4 and IPV6 networks are.

ESP supplies messages /Payload encipher, it also helps in authenticating Payload as well as where it originated from in the IPSec protocol suite.

6 0
3 years ago
Other questions:
  • Which functions are performed by server-side code??​
    10·1 answer
  • Jeff needs to apply a theme and change the font of the theme in the presentation that he is making. Put the steps in the order t
    14·1 answer
  • At an uncontrolled intersection, you should yield to the car on the right. True or false.
    10·2 answers
  • Write a program that accepts three decimal numbers as input and outputs their sums?​
    5·1 answer
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • Draw a logic circuit for the function F = (A + B)(B + C)(A + C), using NOR gates only. ​
    9·1 answer
  • A key physical design element is the ____, which describes how users interact with a computer system
    11·1 answer
  • When searching for an image on your computer, you should look for a file with which of the following extensions?
    8·1 answer
  • Complete the statement below using the correct term.<br>Website managers use<br>every day​
    11·2 answers
  • given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_val
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!