1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
14

Modern database tools support ________________, which entails separating data from the programs that manipulate data.

Computers and Technology
1 answer:
Bas_tet [7]3 years ago
8 0
The correct answer: Data independence

Data independence<span> is the type of </span>data<span> transparency that matters for a centralised DBMS. It refers to the immunity of user applications to changes made in the definition and organization of </span>data<span>. Physical </span>data independence<span> deals with hiding the details of the storage structure from user applications.
</span>
The logical<span> structure of the data is known as the 'schema definition'. In general, if a user application operates on a subset of the </span>attributes<span> of a </span>relation<span>, it should not be affected later when new attributes are added to the same relation. Logical data independence indicates that the conceptual schema can be changed without affecting the existing schemas.
</span>
<span>The physical structure of the data is referred to as "physical data description". Physical data independence deals with hiding the details of the storage structure from user applications. The application should not be involved with these issues since, conceptually, there is no difference in the operations carried out against the data.</span>
You might be interested in
Which data type is -7
bixtya [17]

Answer:

integer

Explanation:

4 0
3 years ago
tiny electrical paths to connect everything together is called ? A. graphic card B. audio card C. CPU D. Motherboard
k0ka [10]

Answer:

Option C, or the CPU.

Explanation:

The audio card simply translate code into sound, the graphic card turns code into graphics, CPU runs electric through tons of little electric pathways, and the motherboard is the object of which all of the above are rested on and connects them together.

8 0
2 years ago
Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message? Thi
ad-work [718]

Answer:

This is a notification message for a normal but significant condition

Explanation:

Syslog represents the standard for logging message, it sends messages through UDP port 514. Familiar syslog facilities includes IP, OSPF protocols, etc. The messages from syslog are both about facility and level.

A syslog server is a means through which network devices sends messages about events into a logging server which is called syslog server. Since a syslog protocol supports so many devices, it can also be used to log a good number of events.

8 0
2 years ago
Read 2 more answers
I need help 50 points and brainless if you answer
nata0808 [166]

Answer:

50

var X gets passed into the rectangle function, which I assume would set the x and y coordinates to what the var's have already been set to.

4 0
2 years ago
Read 2 more answers
I am programming and i want to find the amount of move functions i need to complete the full square. the square is 65 by 70 circ
Ahat [919]
Not to be rude, but this is elementary school. How would anyone know this?
8 0
3 years ago
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • Casting is one of the oldest known manufacturing processes. <br> True or false
    6·2 answers
  • A certain computer has a 4meg address space. how many bits wide is this computer's address bus?
    10·1 answer
  • You have found statistics on the Internet that you would like to use in your speech.
    6·1 answer
  • Charli's password was changed a couple of weeks ago because someone figured it out. Can someone go to a password generator and f
    5·2 answers
  • Write a method for the Invitation class that accepts a parameter and uses it to update the address for the event.
    9·1 answer
  • Which properties would be useful to know to search for a Word document? Check all that apply.
    7·1 answer
  • Here is the header for a function named computeValue:
    11·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
  • A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!