1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
12

1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (

e) data independence (f)security (g) integrity (h) views
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
3 0

Answer:

The answer to this question can be defined as below:

Explanation:

  • Data:  Data is described as information, or records, which are contained in and used on a system. The use of data as a single subject or as a plural topic is appropriate. It is also known as raw data.
  • Database: It is an information system, that holds the data in a sequence. It is a shared collection of logical data, that use in web pages on the website back end with a database. like, Microsoft Access, MySQL, etc.
  • Database management system:  It user-funded software framework to read, download and development of data. Takes queries and the database exists.
  • Database application program: It is a software program that primarily uses the information to insert and retrieve from the database. It was developed from 1957 onward. At a certain stage in its operation communicates with the database.
  • Data independence:  It adjusts the information features without modifying the application to share information. It is a skill, that provides reductions in resources, as well as the possible mistakes caused by the reduction in authentication application updates, which are significant.
  • Security: It means protection and safeguarding or safeguarding measures. In the organization it is called security, which includes a suspicious client, call security for him to take away. It enables multiple users to access the data on time.
  • Integrity:  It is also known as the protection of data integrity is critical. It authenticates the data and provide integrity safety, and also improves reliability, efficiency, and reusability.
  • Views:  It is also known as the digital database table, which includes knowledge and sub-set. It is static, in which the data is fluid based on the time the view is viewed.
You might be interested in
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
4 years ago
Select the correct answer.
galben [10]

Answer:

the RAM if i am not mistaking

8 0
4 years ago
The AND operator is a disjunction and the OR operator is a conjunction.
qwelly [4]

Answer:

True but it might be false but i think is true

8 0
3 years ago
______ lets people access their stored data from a device that can access the Internet.
Lelechka [254]

Answer:

Cloud computing and applications

Explanation:

6 0
3 years ago
How can ICTs be used in the workplace to improve the way employees
nadezda [96]

Answer:

it allows them to work more efficiently, with fewer waisted resources

Explanation:

3 0
3 years ago
Other questions:
  • What role do you think mobile devices have played in shaping the world?
    13·1 answer
  • Select the proper ergonomic keyboarding techniques.
    9·1 answer
  • What country threatens Denmark at the beginning of Hamlet as evidenced in Marcellus’s question, "Why this same strict and most o
    13·1 answer
  • You want to use a wireless keyboard and mouse with your laptop computer. which method should you use
    11·1 answer
  • How do you insert a new row into a worksheet
    5·1 answer
  • How do Web browsers interact with URL/URIs to navigate the internet
    14·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    6·1 answer
  • Which statement is false? Select one: a. Function printf does not care how large the array it is printing is. b. Function scanf
    9·1 answer
  • How are computers used in education and entertainment? List them.​
    10·1 answer
  • Would you consider upgrading Maxine’s wardrobe a need or a want?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!