1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
12

1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (

e) data independence (f)security (g) integrity (h) views
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
3 0

Answer:

The answer to this question can be defined as below:

Explanation:

  • Data:  Data is described as information, or records, which are contained in and used on a system. The use of data as a single subject or as a plural topic is appropriate. It is also known as raw data.
  • Database: It is an information system, that holds the data in a sequence. It is a shared collection of logical data, that use in web pages on the website back end with a database. like, Microsoft Access, MySQL, etc.
  • Database management system:  It user-funded software framework to read, download and development of data. Takes queries and the database exists.
  • Database application program: It is a software program that primarily uses the information to insert and retrieve from the database. It was developed from 1957 onward. At a certain stage in its operation communicates with the database.
  • Data independence:  It adjusts the information features without modifying the application to share information. It is a skill, that provides reductions in resources, as well as the possible mistakes caused by the reduction in authentication application updates, which are significant.
  • Security: It means protection and safeguarding or safeguarding measures. In the organization it is called security, which includes a suspicious client, call security for him to take away. It enables multiple users to access the data on time.
  • Integrity:  It is also known as the protection of data integrity is critical. It authenticates the data and provide integrity safety, and also improves reliability, efficiency, and reusability.
  • Views:  It is also known as the digital database table, which includes knowledge and sub-set. It is static, in which the data is fluid based on the time the view is viewed.
You might be interested in
For this lab you will write a class to create a user-defined type called Shapes to represent different shapes, their perimeters
maw [93]
<h2>Answer:</h2>

<u />

========= Shape.java  ===========

//import the Scanner class

import java.util.Scanner;

public class Shape{

   //required fields

  private String shape;

   private double area;

   private double perimeter;

   //default constructor

  public Shape(){

       this.shape = "unknown";

       this.area = 0.0;

       this.perimeter = 0.0;

   }

   //constructor with one parameter

   public Shape(String shape){

       this.setShape(shape);

       this.area = 0.0;

       this.perimeter = 0.0;

   }

   //accessors and mutators

  public void setShape(String shape){

       this.shape = shape;

   }

  public String getShape(){

       return this.shape;

   }

   public double getPerimeter(){

       return this.perimeter;

   }

  public double getArea(){

       return this.area;

   }

  public void setPerimeter(Scanner scr){

       if(this.getShape().equals("circle")){

           System.out.println("Enter the radius of the circle");

           double radius = scr.nextDouble();

           this.perimeter = 2 * 3.142 * radius;

       }

       else if(this.getShape().equals("rectangle")){

           System.out.println("Enter the width");

           double width = scr.nextDouble();

           System.out.println("Enter the height");

           double height = scr.nextDouble();

           this.perimeter = 2 * (width + height);

       }

       else if(this.getShape().equals("square")){

           System.out.println("Enter the height or width");

           double height = scr.nextDouble();

           this.perimeter = 4 * height;

       }

       else if(this.getShape().equals("unknown")){

           System.out.println("You must define a shape first before calculating perimeter");

           this.perimeter = 0.0;

       }

       else {

           System.out.println("You must define a shape first before calculating perimeter");

           this.perimeter = 0.0;

       }

   }

   public void setArea(Scanner scr){

       if(this.getShape().equals("circle")){

           System.out.println("Enter the radius of the circle");

           double radius = scr.nextDouble();

           this.area = 3.142 * radius * radius;

       }

       else if(this.getShape().equals("rectangle")){

           System.out.println("Enter the width");

           double width = scr.nextDouble();

           System.out.println("Enter the height");

           double height = scr.nextDouble();

           this.area = width * height;

       }

       else if(this.getShape().equals("square")){

           System.out.println("Enter the height or width");

           double height = scr.nextDouble();

           this.area = height * height;

       }

       else if(this.getShape().equals("unknown")){

           System.out.println("You must define a shape first before calculating area");

           this.area = 0.0;

       }

       else {

           System.out.println("You must define a shape first before calculating area");

           this.area = 0.0;

       }

   }

   //Own methods

   //1. Method to show the properties of a shape

   public void showProperties(){

       System.out.println();

       System.out.println("The properties of the shape are");

       System.out.println("Shape : " + this.getShape());

       System.out.println("Perimeter : " + this.getPerimeter());

       System.out.println("Area : " + this.getArea());

   

   }

   //2. Method to find and show the difference between the area and perimeter of a shape

   public void getDifference(){

       double diff = this.getArea() - this.getPerimeter();

       System.out.println();

       System.out.println("The difference is " + diff);

   }

}

========= ShapeTest.java  ===========

import java.util.Scanner;

public class ShapeTest {

   public static void main(String [] args){

       Scanner scanner = new Scanner(System.in);

       // create an unknown shape

       Shape shape_unknown = new Shape();

       //get the shape

       System.out.println("The shape is " + shape_unknown.getShape());

       //set the area

       shape_unknown.setArea(scanner);

       //get the area

       System.out.println("The area is " + shape_unknown.getArea());

       //set the perimeter

       shape_unknown.setPerimeter(scanner);

       //get the perimeter

       System.out.println("The perimeter is " + shape_unknown.getPerimeter());

       // create another shape - circle

       Shape shape_circle = new Shape("circle");

       //set the area

       shape_circle.setArea(scanner);

       //get the area

       System.out.println("The area is " + shape_circle.getArea());

       //set the perimeter

       shape_circle.setPerimeter(scanner);

       //get the area

       System.out.println("The perimeter is " + shape_circle.getArea());

       //get the properties

       shape_circle.showProperties();

       //get the difference between area and perimeter

       shape_circle.getDifference();

   }

}

<h2>Sample output:</h2>

The shape is unknown

You must define a shape first before calculating area

The area is 0.0

You must define a shape first before calculating perimeter

The perimeter is 0.0

Enter the radius of the circle

>> 12

The area is 452.448

Enter the radius of the circle

>> 12

The perimeter is 452.448

The properties of the shape are

Shape : circle

Perimeter : 75.408

Area : 452.448

The difference is 377.03999999999996

<h2>Explanation:</h2>

The code above is written in Java. It contains comments explaining important parts of the code. Please go through the code for more explanations. For better formatting, the sample output together with the code files have also been attached to this response.

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
57aa40cd91dceaa5454e65fc5d209315.png
5 0
3 years ago
Computer designers have concentrated on technology using gallium arsenide instead of silicon because silicon:
cestrela7 [59]

Answer: cannot emit light and has speed limitations

Explanation:

Silicon is usually used in computer chips and solar cells but Gallium arsenide is regarded as a better alternative even though it's costly than silicon.

Gallium arsenide has technical advantages over silicon as its electrons

move through it faster than they move through silicon. Also, cannot emit light and has speed limitations.

Gallium arsenide is used in manufacturing devices like infrared light-emitting diodes, solar cells, optical windows, etc.

7 0
3 years ago
Which of the following is a typical feature of forums but not of review sites?
kkurt [141]
Actually, two options are correct:

They allow private messaging. -  this is your safest option, as review sites don't offer private messaging (many rewiews are anonymous, so that would kill the point), but all forums do.
<span>

You need to sign up to be a member
</span>Actually, this is also true, as many, if not most forums do require you to sign up, so that it is visible whenever a certain person posts again - otherwise you won't know if you're talking to the same person! however, many review sites, for example reviewing doctors, let you post without signing in.
6 0
4 years ago
Read 2 more answers
Which of the following is something you might ask yourself to determine if an
ra1l [238]

Answer:

B

Explanation:

I honestly am not "shore" but tried lol

7 0
4 years ago
Read 2 more answers
Which type of attack is being utilized when the attacker asks you to hold a security door open for them after you have successfu
ddd [48]
When the attacker <span>asks you to hold a security door open for them after you have successfully authenticated using your proximity badge or access badge backdoor attack is being utilized. The backdoor malware gives you to have normal authentication procedure and the remote access is granted.
</span><span>This attack exploits vulnerabilities within applications.</span>
Backdoors are used for a number of malicious activities: data theft, server hijacking, Website defacing and many more.
6 0
3 years ago
Other questions:
  • Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?
    5·1 answer
  • Which of these shortcuts becomes available only when text is highlighted?
    10·1 answer
  • how does modern information technology has affected society ?? Need help on how it has affected society
    10·1 answer
  • What is the purpose of primary manufacturing processes?
    12·2 answers
  • What does the Attack Time slider let you set?
    12·1 answer
  • If you suspect corrupted system files are causing issues, what command can be run to search for and replace the corrupted files?
    13·1 answer
  • Different types of names given to explicit convertion in java<br>​
    6·1 answer
  • Aisha designed a web site for her school FBLA club. Which item should Aisha consider for improved responsive design?
    6·2 answers
  • Software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development
    7·2 answers
  • Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!