1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
3 years ago
10

In database systems, the dbms enforces rules about which user can perform which action when. The rules are known as ________.

Computers and Technology
1 answer:
saw5 [17]3 years ago
6 0

I guess the correct answer is concurrency control

Cοncurrеncy cοntrοl is a databasе managеmеnt systеms (DBMS) cοncеpt that is usеd tο addrеss cοnflicts with thе simultanеοus accеssing οr altеring οf data that can οccur with a multi-usеr systеm.

In database systems, the DBMS enforces rules about which user can perform which action when. The rules are known as concurrency control.

You might be interested in
What were precomputed tables and why were they necessary?​
Alex Ar [27]

Answer:

In algorithms, precomputation is the act of performing an initial computation before run time to generate a lookup table that can be used by an algorithm to avoid repeated computation each time it is executed.

7 0
3 years ago
Read 2 more answers
After you enter a formula and press enter, you see #DIV/0!. This means _____.
Travka [436]
The error message gives it away "#DIV/0!". A division by zero error has occurred, and and error is displayed because dividing by zero is mathematically impossible.
3 0
3 years ago
Talia was a scientist whose research compared the birth rates of young women of a New England community over the course of five
podryga [215]

Answer: b

Explanation: for me personally i will populate an infographic(chart)rather than essay form i prefer to use an infographic to show my anaylis how it went high or low or when.

8 0
3 years ago
Read 2 more answers
What is the scope of each variable?
kari74 [83]

Answer:

scope of pet name is limited to pet class and color is accessible to the whole program

Explanation:

4 0
3 years ago
Read 2 more answers
You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b.
Yakvenalex [24]

Answer:

D

Explanation:

Encryption secures transmissions on the internet to or from your PC

5 0
3 years ago
Other questions:
  • One suggested means of gaining eye contact before reversing is to:____.
    12·1 answer
  • The Start menu on Windows computers changes based on actions performed by their users. True False
    15·2 answers
  • Will mark brainliest if correct. First come, first serve.
    10·1 answer
  • The roman structure that features heavy use of arches and columns is the _______.
    6·1 answer
  • Consider a sequence of 1's and 1's with the property that the sum of any prefix of the sequence is never negative For example th
    5·1 answer
  • Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not
    10·1 answer
  • What is the best prediction she could make about this
    15·2 answers
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • Why does a computer need programs? ​
    8·2 answers
  • TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!