1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
3 years ago
12

Jed is the database administrator for a mid-sized computer component manufacturer. He is responsible for validating the data mod

el to be used by the DBMS, and specifying the database requirements to endure all appropriate user input is considered. This is an example of Jed's ________ tasks
Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
3 0

Answer:

Development task is the correct answer to the given question.

Explanation:

The database administrator is responsible for managing the database management system . The overall security of the database is depended on the database administrator.

The Development task include the following function  

  • Verification of the data model that is used by the database management system .
  • Check the user input it means validating the data.
  • Defining the overall requirement to create the model.
  • Providing backup when the data is loss .

So the Development task is the correct answer.

You might be interested in
Which components of the​ five-component model is commonly thought of as the​ "bridge" that links the computer side of the model
-Dominant- [34]

Answer:

The correct answer to the following question will be "Data".

Explanation:

  • Data would be any series of one or even more signs which are given significance by unique classification action. To become knowledge the data needs to be interpreted.
  • Data is generally considered to be the "bridge" that connects the designer's machine part with the practical side.

Therefore, this will be the right answer.

3 0
3 years ago
ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!
ra1l [238]

Answer:

1 c

2 a

3 c

4 b

5 c

6 b

7 d

8 a

9 d

10 b

6 0
3 years ago
Read 2 more answers
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
Agata [3.3K]

Answer:

The answer is "ICANN"

Explanation:

In the given question some information is missing, that is option, which can be described as follows:

A) IAB

B) ICANN

C) W3C

D) ISOC

It manages the installation and processes of multiple databases concerning the Network domain and  provides a stable and safe networking service, and wrong choices were explained as follows:

  • IAB, It provides a protocol to manage IETF, that's why it is wrong.
  • W3C is used in web development.
  • ISOC is used to provide internet accessibility.
6 0
3 years ago
What is the value of y when this code executes?
Cerrena [4.2K]

Answer:

The operation of 6*x only executes if x is greater or equal to 0, since x=-10 and -10 is less than 0, the operation does not execute. For this reason,  the value of y using this code is None.

Explanation:

In python a function is defined with the syntaxis:  

def function(x):  

the operation to execute (x)

value to return

In this case, the function is foo and the parameter is x:  

def foo(x):

  if x>= 0:

     return 6*x

The code starts by assigning a value to x. Then, the code asks if the value of x is grater or equal to 0, if this condition is meet, then the code returns the value of 6 times x, if not, then the code does not return a value. In this case, x is -10 and this value is not grater or equal to 0. Given that the condition is not met, then the code stops executing and the value of y is none.

4 0
3 years ago
Which of the following statements is true regarding ARPANET? Select 3 options. It was a product of Bell Laboratories and was int
vlada-n [284]

Answer:

2. It was created to connect geographically dispersed researchers with high powered research computers.

3. The first message was sent through ARPANET in 1969 and it was decommissioned in 1990.

5. It led to the development of the Internet.

Explanation:

4 0
3 years ago
Other questions:
  • In your own words, explain the role of scientific investigation in the development of the Theory of Evolution.
    6·1 answer
  • What term is used to describe a function that uses an algorithm to convert an input of letters and numbers into an encrypted out
    9·1 answer
  • What is the financial aspect for a business as to what database software they will buy?
    6·1 answer
  • Level of comfort that people feel
    10·1 answer
  • As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
    14·1 answer
  • Where on the internet can you find a site that will allow you to tour bill gates mansion
    8·2 answers
  • Discuss the impact printer and its types in detail?
    7·1 answer
  • Your project will require a 7-day work week rather than the traditional 5-day. How can you adapt the software to this new schedu
    15·1 answer
  • A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.
    6·1 answer
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!