1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
12

1.2 Discuss each of the following terms: (a) data (b) database (c) database management system (d) database application program (

e) data independence (f)security (g) integrity (h) views
Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
3 0

Answer:

The answer to this question can be defined as below:

Explanation:

  • Data:  Data is described as information, or records, which are contained in and used on a system. The use of data as a single subject or as a plural topic is appropriate. It is also known as raw data.
  • Database: It is an information system, that holds the data in a sequence. It is a shared collection of logical data, that use in web pages on the website back end with a database. like, Microsoft Access, MySQL, etc.
  • Database management system:  It user-funded software framework to read, download and development of data. Takes queries and the database exists.
  • Database application program: It is a software program that primarily uses the information to insert and retrieve from the database. It was developed from 1957 onward. At a certain stage in its operation communicates with the database.
  • Data independence:  It adjusts the information features without modifying the application to share information. It is a skill, that provides reductions in resources, as well as the possible mistakes caused by the reduction in authentication application updates, which are significant.
  • Security: It means protection and safeguarding or safeguarding measures. In the organization it is called security, which includes a suspicious client, call security for him to take away. It enables multiple users to access the data on time.
  • Integrity:  It is also known as the protection of data integrity is critical. It authenticates the data and provide integrity safety, and also improves reliability, efficiency, and reusability.
  • Views:  It is also known as the digital database table, which includes knowledge and sub-set. It is static, in which the data is fluid based on the time the view is viewed.
You might be interested in
Help me, please! No links btw :)
Nikolay [14]

Answer:

c im trying my best sorry if you get it wrong

Explanation:

7 0
3 years ago
Read 2 more answers
Explain how communication facilitate cordination​
Oksana_A [137]

Answer:

Communication greatly helps in coordination. Effective communication facilitates information and exchange of ideas which helps to achieve the common purpose. Coordination is facilitated by exchange of such ideas and information and brings people together.

Explanation:

4 0
3 years ago
Larry sent an email to Andy. Andy didn't open Larry's email but still understood what the message was. How did Andy determine th
Sladkaya [172]

Andy knew what the message was because of the subject you are required to add in almost all email sights.

7 0
3 years ago
What area displays the title of the document
bazaltina [42]

Answer:

The title bar

Explanation:

The Title Bar is the part of a software that tells the user the name of the software being worked on and the document currently being edited.

8 0
4 years ago
In a network, servers receive requests from which of the following?
Margarita [4]

Answer: routers, which direct the data to the correct destination.

Explanation:

In a network, servers receive requests from the routers, which direct the data to the correct destination.

The router simply refers to the networking device which helps in the forwarding of data packets between the computer networks. When a data packet is sent through one of the lines, then the information regarding the network address will be read by the router which will help it in determining the destination.

5 0
3 years ago
Read 2 more answers
Other questions:
  • How does hardware differ from software
    9·1 answer
  • In your presentation you added a text box to?
    5·1 answer
  • When you buy an Xbox 360 can you play online for free
    12·2 answers
  • The following characteristics are common to the majority of cloud environments, except: 1. on-demand usage 2. resiliency measure
    12·1 answer
  • It is the ornamentation of textiles and other material with needle work
    7·1 answer
  • The older computer had a CPU that ran at 266MHz compared to a current CPU that runs 3.7GHz. How many times faster is the new CPU
    7·1 answer
  • USE THIS CODE ON FETCH REWARDS FOR BRAINLIEST​ Also I will be doing a gift card giveaway for the ppl that use my code ​
    6·2 answers
  • What pc games do you all play?
    14·2 answers
  • Jim wants to shoot a video. This requires him to move from one place to another. Which type of camera support should Jim use?
    13·1 answer
  • Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!