1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
4 years ago
9

Explain what is a database schema and mention one example

Computers and Technology
1 answer:
Taya2010 [7]4 years ago
4 0

Answer:

Database schema is a structure that are used to represent the logical base in the database. Database schema is the logic arrangement of objects in the form of tables. It basically defines the entities and the relationship between them. Schema is the organisation of data in the database system.

It is divided into two main parts that is:

  • Logical database schema
  • Physical database schema

Example:

When we create a table with the student name then, the logical database schema contain the student name, student ID and the project name. Then, the student table basically stored in the physical database schema in the form of file.

You might be interested in
What kind of firewall can block designated types of traffic based on application data contained within packets?
Bess [88]

Answer:

Content Filtering Firewall.

Explanation:

  • Content Filtering Firewall can block designated types of traffic based on application data contained within the packets.
  • This ensures that objectionable websites , web portals, emails containing objectionable material can be screened.
  • This blocks the access to that particular content.
  • This helps in keeping away Malware and secure the network and systems.
  • Both hardware and software can be used to implement the content filters.
4 0
3 years ago
Help please if you know answer like these I’ll provide my discord.
Natasha_Volkova [10]

ins can insert a time and date.

5 0
3 years ago
Discuss how the user-designer communications gap can cause a good project to go bad.
Mila [183]
This gap between user-designer communications <span>can cause a good project to go bad i</span>f the user is not able to process what is required to be fixed in order for the project to run smoothly. The user may have one way of fixing something while the designer has another. In this case, the designer understands how the project fully works while the user does not and this may end up compromising the whole project.

The law that “designers are not users” and “users are not designers” should always be followed.




3 0
4 years ago
Which Boolean operator limits information from the search parameters
solniwko [45]
The answer isC.Without
7 0
4 years ago
A list of the available nonkeyboard characters can be seen in Windows by opening what utility?
slava [35]

Answer:

charmap.exe

Explanation:

A list of available non keyboard characters can be seem in Windows by selecting start and entering a utility called charmap.exe. Enter charmap.exe in search box and then click on that non keyboard character.The character is inserted in application by holding Alt key and coressponding numerical or letter key on keyboard. It can also be invoked in Windows by typing charmap in command prompt. When a user is frequently using a specific character he can lean keystroke assigned to that character. Character Map is a free utility in Windows operating systems for locating and placing non keyboard characters, special symbols. It is also used for word processing programs like MS Word. This is an efficient way to make passwords stronger by using special characters which are not visible on keyboard.

Holding down the Alt key and the corresponding letter or number key on the keyboard, the character is placed in the application

5 0
4 years ago
Other questions:
  • Assume that a gallon of paint covers about 350 square feet of wall space. Create an application with a main() method that prompt
    9·1 answer
  • Which network topology requires terminators at the ends of the backbone cable?
    6·1 answer
  • Which signal types are represented by a continuous wave form?
    11·1 answer
  • Which asset would be helpful in assessing a web or UI designer’s skills?
    13·2 answers
  • Which of the following software is unique to a Mac?
    15·2 answers
  • Assume a TCP segment consisting of 1500 bits of data and 160 bits of header is sent to the IP layer, which appends 120 bits of h
    14·1 answer
  • NEXT
    15·2 answers
  • If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should
    6·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • Write an if-else statement for the following: If user_tickets is less than 5, assign num_tickets with 1. Else, assign num_ticket
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!