Answer:
<em>DBMS Performance
</em>
Explanation:
Database tuning <em>defines a range of activities that are used to maximize and homogenize a database's output.</em>
This typically coincides with query tuning, but applies to database file layout, DBMS software selection, and database environment setup (operating system, CPU).
Database tuning helps to optimize the use of machine resources in order to carry out work as efficiently and quickly as possible.
Many systems are built to handle their use of system resources, but there is still plenty of space for enhancing their performance by tailoring their server and DBMS settings and configuration.
In my answer I am making an assumption that there is no runtime error, if there is then the error is “a run-time error”.
The answer is the program suffers from a Logic Error
<u>Normally windows end user can login 3 ways as follow:</u>
1. End user can Login as local account where user has not connected or even connected to local Area network LAN.
2. Next user can login into cloud accounts nothing but hot mail accounts
3. Login to windows domain controller where end user should connect to LAN.
Purpose of installation of Windows domain controller with Active Directory is to keep trace and keep log history activities.
Due to windows domain controller with Active Directory end user desktop or laptop has control on software access also.
Every time when end user login on windows domain controller a small modified is executed whenever is required. It is not going effort the workstation performances.
Note: - Domain severs should be POWER on first.
I think the correct answer would be FOCUS2. It is a system that guides members in choosing college or a major. It provides a starting point for students who are not yet certain of what they want to take academically. Hope this helps.
Answer: A) Phishing
Explanation:
Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain confidential information like pin code, credit card number, login details etc of that user.
- According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
- Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
- Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
- Thus, the correct option is option(A).