1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
4 years ago
14

Modern database tools support ________________, which entails separating data from the programs that manipulate data.

Computers and Technology
1 answer:
Bas_tet [7]4 years ago
8 0
The correct answer: Data independence

Data independence<span> is the type of </span>data<span> transparency that matters for a centralised DBMS. It refers to the immunity of user applications to changes made in the definition and organization of </span>data<span>. Physical </span>data independence<span> deals with hiding the details of the storage structure from user applications.
</span>
The logical<span> structure of the data is known as the 'schema definition'. In general, if a user application operates on a subset of the </span>attributes<span> of a </span>relation<span>, it should not be affected later when new attributes are added to the same relation. Logical data independence indicates that the conceptual schema can be changed without affecting the existing schemas.
</span>
<span>The physical structure of the data is referred to as "physical data description". Physical data independence deals with hiding the details of the storage structure from user applications. The application should not be involved with these issues since, conceptually, there is no difference in the operations carried out against the data.</span>
You might be interested in
Adjectives to describe programming skills
Ronch [10]

Answer:

Here are some adjectives for programmer: archetypal `real, ultimate navigational, former lucid, one-year-old professional, year-old professional, media-friendly genetic, inevitable seven-year, >gical, adgical, ever silent and phlegmatical, silent and phlegmatical, ]real, extremely defensive, and brilliant cryptographic.

8 0
3 years ago
A company has a custom object named Region. Each account in salesforce can only be related to one region at a time, but this rel
dezoksy [38]

Answer:

Master - detail relationship

Explanation:

Master-detail relationship is the type of relationship that appears just like parent-child relationship, Therefore, Master-detail relationship can be defined both between standard object or custom object. The detail object receives the security and sharing settings that's also given to the master object, automatically.

8 0
3 years ago
How do you get Brainliest on a question?
Mama L [17]

Answer:

yes that is the way things work and I think for the answer to be marked brainiest there must be two answers that were posted.

Explanation:

Hope this helps:)

5 0
3 years ago
Read 2 more answers
In the center pane of the __________, the direction of each arrow indicates the direction of the TCP traffic, and the length of
7nadin3 [17]

Answer:

The answer is B (Flow Graph Analysis results)

Explanation:

Flow Graph Analysis results is a graphical representation of control flow which is process oriented, it shows all the paths through a program during its execution.

4 0
4 years ago
Which feature of a router provides traffic flow and enhances network security?
Vika [28.1K]
The answer would be...<span>ACLs</span>
6 0
3 years ago
Other questions:
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • Olivia creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her inco
    8·1 answer
  • Brian is selecting an authentication protocol for a PPP connection. He would like to select an option that encrypts both usernam
    7·1 answer
  • What type of data is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter
    13·1 answer
  • What is the primary benefit of using solid state storage
    7·1 answer
  • What are Important advice to include about spyware, viruses, and other types of malware?
    8·1 answer
  • State three reasons why users attach speakers to their computer​
    8·1 answer
  • What feature did the 32X add to the Sega Genesis?
    14·2 answers
  • Five real world objects with similar characteristics​
    6·1 answer
  • Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of researc
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!