1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
12

1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (

e) data independence (f)security (g) integrity (h) views
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
3 0

Answer:

The answer to this question can be defined as below:

Explanation:

  • Data:  Data is described as information, or records, which are contained in and used on a system. The use of data as a single subject or as a plural topic is appropriate. It is also known as raw data.
  • Database: It is an information system, that holds the data in a sequence. It is a shared collection of logical data, that use in web pages on the website back end with a database. like, Microsoft Access, MySQL, etc.
  • Database management system:  It user-funded software framework to read, download and development of data. Takes queries and the database exists.
  • Database application program: It is a software program that primarily uses the information to insert and retrieve from the database. It was developed from 1957 onward. At a certain stage in its operation communicates with the database.
  • Data independence:  It adjusts the information features without modifying the application to share information. It is a skill, that provides reductions in resources, as well as the possible mistakes caused by the reduction in authentication application updates, which are significant.
  • Security: It means protection and safeguarding or safeguarding measures. In the organization it is called security, which includes a suspicious client, call security for him to take away. It enables multiple users to access the data on time.
  • Integrity:  It is also known as the protection of data integrity is critical. It authenticates the data and provide integrity safety, and also improves reliability, efficiency, and reusability.
  • Views:  It is also known as the digital database table, which includes knowledge and sub-set. It is static, in which the data is fluid based on the time the view is viewed.
You might be interested in
Jamie is not sure a new medication will work because it has not had a large test group. Is Jamie being creative?
Mumz [18]
No, they're being skeptical.
4 0
3 years ago
Read 2 more answers
Which best describes the benefits of renting a home?
arlik [135]
The benefit of actually growing up.
5 0
4 years ago
Which tool did Adnan use to modify the image?
artcher [175]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
Computer ethis are crime done using computer technology (true )and(false)​
aliya0001 [1]

computer ethis are crime done using computer technology (true )and(false)

answer- true

8 0
3 years ago
True or false.
RideAnS [48]
I think it’s true that you can select image properties from the image menu
6 0
3 years ago
Other questions:
  • Which access object(s may be used when creating a lookup field to select valu?
    8·1 answer
  • What does the shell of an operating system do
    14·1 answer
  • Name the six parts of the product development life cycle.
    7·2 answers
  • A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataS
    12·2 answers
  • What key do I use to start my presentation
    9·1 answer
  • A _____ is relatively inexpensive to install and is well-suited to workgroups and users who are not anchored to a specific desk
    14·1 answer
  • Write the use of these computers.
    14·1 answer
  • What is Digital Citizen? It's one of my classes.
    5·1 answer
  • Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f
    14·2 answers
  • Lab 8-1: Working with Boot Loader and Runlevels what is the root password
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!