The way a particular application views the data from the database that the application uses is a sub-schema.
<h3>What is Database?</h3>
A Database may be defined as a process of collecting data and information that is principally assembled for quick search and recoupment by a computer.
The sub-schema is the reasoning elucidation of that section of the database which is applicable and accessible to a specific application. This type of database is common to two or more applications.
Therefore, the sub-schema is the way through which a particular application views the data from the database that the application uses.
To learn more about Database, refer to the link:
brainly.com/question/26096799
#SPJ4
Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.
Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.
In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.
In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.
In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.
Read more: brainly.com/question/17307459
Answer:
I believe it is medical telemetry