1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
12

1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (

e) data independence (f)security (g) integrity (h) views
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
3 0

Answer:

The answer to this question can be defined as below:

Explanation:

  • Data:  Data is described as information, or records, which are contained in and used on a system. The use of data as a single subject or as a plural topic is appropriate. It is also known as raw data.
  • Database: It is an information system, that holds the data in a sequence. It is a shared collection of logical data, that use in web pages on the website back end with a database. like, Microsoft Access, MySQL, etc.
  • Database management system:  It user-funded software framework to read, download and development of data. Takes queries and the database exists.
  • Database application program: It is a software program that primarily uses the information to insert and retrieve from the database. It was developed from 1957 onward. At a certain stage in its operation communicates with the database.
  • Data independence:  It adjusts the information features without modifying the application to share information. It is a skill, that provides reductions in resources, as well as the possible mistakes caused by the reduction in authentication application updates, which are significant.
  • Security: It means protection and safeguarding or safeguarding measures. In the organization it is called security, which includes a suspicious client, call security for him to take away. It enables multiple users to access the data on time.
  • Integrity:  It is also known as the protection of data integrity is critical. It authenticates the data and provide integrity safety, and also improves reliability, efficiency, and reusability.
  • Views:  It is also known as the digital database table, which includes knowledge and sub-set. It is static, in which the data is fluid based on the time the view is viewed.
You might be interested in
PLEASE HELP QUICK WILL GIVE BRAINLY
kipiarov [429]

Answer: Where the guide lines?

Explanation: I’ll help but where the guidelines?

7 0
3 years ago
How to transfer photos from iphone to computer
SSSSS [86.1K]
If you’re using a Windows computer, the best way to transfer photos from your iPhone to your computer is via USB cable.
First, plug your phone into your computer using the phone’s USB Cable. The Photo app should launch automatically then click the Import button. Check to select the photos you wish to transfer. Once you checked all the photos you wish to transfer, click on Continue. Click Import to start the transfer.
3 0
3 years ago
25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
Veronika [31]

Answer: don't know sorry

Explanation:

5 0
2 years ago
Read 2 more answers
Which command displays the status of the ipsec installation?
Alexandra [31]
Character command shows the status.
8 0
3 years ago
)Dynamically allocate an object of Banana, using the pointer variable daco.
zepelin [54]

Answer:

d) daco = new Banana;

Explanation:

Dynamically allocated variables have their memory allocated in the heap memory.We declare a dynamical variable like this:-

int *a=new int ;

It means a pointer a is created on the stack memory which hold the address of the block that hold the value of variable a in heap memory.

We already have the pointer daco. We just have to initialize with keyword new.

It will be like daco=new Banana; which matches the option d.

5 0
3 years ago
Other questions:
  • ________ is used to store programs and instructions that are automatically loaded when the computer is turned on.
    14·1 answer
  • The process of changing data from their original form to a format that more closely fits the research objectives of the research
    9·1 answer
  • Data cannot be sorted of filtered accurately if there are ________.
    10·2 answers
  • A key field is used to _____. enter a password uniquely identify records merge data list the most important information
    12·2 answers
  • If the base-10 system stops with the<br> number 9, then why isn't it called<br> base-9?
    15·1 answer
  • . Some countries lack physical resources, like computers or network connections, making it difficult to keep up with the technol
    8·2 answers
  • A(n) _______ gate provides an output of 1 if either or both inputs are 1.
    14·2 answers
  • The best way to safeguard your document is to save it
    11·1 answer
  • The __________ statement allows you to check for
    7·1 answer
  • You send a friend a private message about something personal that is going on with you. Without permission, she forwards your te
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!