1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
4 years ago
6

Discuss how the Database models effected the business processes and the impact of using the different database models on the bus

iness.
Computers and Technology
1 answer:
JulsSmile [24]4 years ago
7 0

Answer:

The database models depend very much on what will be the use in the business logic of the company will have directly with the database, primarily implying whether or not to use a relational or non-relational database.

Explanation:

In relational databases there is something called normalization, which after the construction of a data model allows me to optimize in a greater way the way in which I will make the queries within this database, that is a fundamental aspect, since one of the fundamental aspects today about the business logic of companies with databases is the capacity to respond when waiting for a query and if it is delayed a lot there will be inconvenience with the expected result.

Currently there are different examples of in which scenario what kind of database is better, distributed, centralized databases, clusters is.. And it is where you need to be very clear about what is my business  and what type of database is adapted more to be.

I hope I could help you.

You might be interested in
Lol WAKE UP!!! and get ready to answer my questions.
deff fn [24]

Answer:

<h2>1. Variable Creation Statement</h2><h2>2. Fav_Num=7</h2>

Explanation:

<h2><em>Hope This Helps :)</em></h2><h2>Im not sure if the 2nd one is correct but i think that it is.</h2>
5 0
3 years ago
In what way is your social media footprint related to your digital ID
ANEK [815]
Your social media footprint is literally your digital ID. Your digital ID is what you are online and your footprint is what you do.
3 0
4 years ago
What are the methods or permissions needed to view the passwords for linux and unix?
Greeley [361]
Anybody can read encrypted passwords, they can't decipher them they're encrypted with a one way encryption algorithm.
4 0
4 years ago
236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
irakobra [83]

Answer:

Embedded System

5 0
2 years ago
Read 2 more answers
How to download gta5 ​
Kazeer [188]
Buy the game and hit download
8 0
3 years ago
Read 2 more answers
Other questions:
  • n the declaration: string color = "blue"; A. the string literal color is assigned to the string reference "blue" B. the string r
    11·2 answers
  • All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
    6·1 answer
  • Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. scree
    15·1 answer
  • What is a googleplex?
    7·1 answer
  • Which description of the plain text file format is most accurate?
    10·1 answer
  • You have a small company and want to keep your cost low, but it is important your employees share data. which network would prov
    13·1 answer
  • What are some reasons a person might choose to remain anonymous on the Internet?
    12·2 answers
  • A microphone plugs into what type of connector
    5·2 answers
  • Ang Kabihasnang ito ay umusbong sa rehiyon ng Timog Mexico
    6·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!