1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesnalui [34]
3 years ago
10

Many computer magazines and Web sites present comparisons of several DBMSs. Find one such DBMS comparison article and compare th

e functions in this chapter to the listed features and functions in the article. Which functions from this chapter are included in the article? Which functions are missing from the article? What additional functions are included in the article? Which DBMS would you recommend for Colonial Adventure Tours? Justify your recommendation.
Computers and Technology
1 answer:
Marianna [84]3 years ago
7 0

<u>In DBMS comparison normally end user compare the following this</u>

1. Cost effective.

2. How much storage capacity

3. Number of concurrent users or connection.

4. Extend storage capacity

<u>Explanation:</u>

Normally end users compare DBMS such as oracle, MySQL, sqlserver, MS access, and postages sql and mongo db.

If it is document oriented or image search best is mongo dB or clouch db, for best relationship management of DBMS such as oracle, MySQL server extra.

For colonial adventure tours and DBMS I would suggest either mongo dB or oracle all depends on organization.

You might be interested in
A new attack involves hacking into medical records and then offering these records for sale on the black market. A medical recor
Flura [38]

Answer:

1. Control Activities

2. Internal

Explanation:

Considering the scenario explained in the question, it can be concluded that This is an IT application of the COSO principle of CONTROL ACTIVITIES and evidence PREVENTIVE controls.

In this case, the Control Activities which is one of the five principles of COSO (Committee of Sponsoring Organizations of the Treadway Commission) is a means of selecting and developing general control over technology, through strategies and techniques. This is what the medical records company did by building controls into its systems to prevent hackers from accessing its system.

This is an example of internal CONTROL ACTIVITIES that illustrates PREVENTIVE control against potential risks or hacks.

8 0
3 years ago
Which PlayStation was the first to allow connection between it and computer network
Bezzdna [24]

If you're talking about connecting to the internet internet, it would be the PS2. You could buy an adapter for an ethernet cable to allow for online play.

4 0
3 years ago
A(n) is the tool that will help you the most when developing the content you will use in your presentation.
ikadub [295]

Answer:

Outline

Hope it helps :)

Explanation:

7 0
3 years ago
How do i make a PDF and what is a PDF<br><br> sorry i am dumb
Soloha48 [4]

Answer:

............................................

Explanation:

5 0
3 years ago
What is the output of code corresponding to the following program segment if ?
wolverine [178]

Answer:

a. You are eligible to vote.

Explanation:

If Age >= 18 Then

Write "You are eligible to vote."

Else

Set - Age

Write "You can vote in " + Years + " years."

End If

The above code block is an example of if-else code block. The if-else code block follow a pattern of:

If (expression) then

else

(expression)

end if

Based on the if Age>= 18 condition, the output will be "You are eligible to vote."

4 0
3 years ago
Other questions:
  • ____ indicates the number of pixels that a computer uses to display the letters, numbers, graphics, and background on a screen.
    12·2 answers
  • 1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (
    12·1 answer
  • A DESKTOP COMPUTER (NAMED WORKSTATION22) CAN'T CONNECT TO THE NETWORK. A NETWORK CARD WAS PURCHASED WITHOUT DOCUMENTATION OR DRI
    14·1 answer
  • When should recursion be avoided?
    9·1 answer
  • If you need to define a connection request policy to apply to an 802.1x authenticating switch or a wireless access point, which
    12·1 answer
  • Introduction to computing systems: from bits and gates to c and beyond
    7·1 answer
  • Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is als
    9·1 answer
  • Avi does not want to save his internet browsing details on his computer. What should he do?
    11·1 answer
  • Which is a linear presentation?
    10·1 answer
  • Select all the correct answers.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!