1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
11

Usually, the same software that is used to construct and populate the database, that is, the DBMS, is also used to present ____.

Computers and Technology
1 answer:
anygoal [31]3 years ago
3 0

Answer: Queries

Explanation: A database management system(DBMS) is a system that contains the data/information in the form of content or tables.There is a software that can populate the system by the excess data usually found in the SQL format

A query is the demand for the extraction of the information that is present in the database table or content.It helps in presenting extracted data in the readable data.The most commonly used language for the queries is the SQL (structured query language) queries.Thus, the correct option is queries.

You might be interested in
Tikenya was responsible for creating the PowerPoint presentation for the group project. When it was complete, she wanted to emai
Anna35 [415]

Answer:

They had to unzip or extract the zipped/ compressed presentation to see it.                          

Explanation:

  • Compressed file or a zip file contains a large file or more than one files that are packed or enclosed that large file or several files into a file or a folder.
  • The compressed file or folder takes less space than the actual large file or set of files.
  • Just as in this scenario the presentation file was larger than the size of what an email file should be. So Tikenya had to compress the file in order to email it to other members.
  • The other members can open the PowerPoint presentation by following any of the below mentioned methods:
  • In Windows to open a compressed file, right click on that file and select Extract All option.
  • File can also be seen by opening that file or folder and dragging that file or folder from the zipped folder to a new location. In Windows this will automatically extract the files.
  • This file can also be opened using a software like WinZip. Download WinZip. Then download the file which is sent in email and double click on that file which will open WinZip wizard dialogue box. Clicking that presentation file from the dialogue box will open another dialogue box confirming the opening of that file. By clicking on OK the presentation file will be opened and can be viewed now.
8 0
3 years ago
Read 2 more answers
Assume that scotus is a two-dimensional character array that stores the family names (last names) of the nine justices on the Su
dangina [55]

Answer:

for (int i = 0; i < 9; ++i) {

int k = 0;

while (k < 20 && scotus[i][k] != '') {

cout << scotus[i][k];

k++; }

cout << "\n"; }

Explanation:

scotus here is a two dimensional array. It contains names of 9 justices. so the loop starts from 0 and ends when i points to the last name element in the array. Then a while loop is used to check that name is longer than twenty characters and will keep on printing each output on the separate line.

Another way to write this:

for (int i = 0; i < 9; i++){

cout << scotus[i] << "\n"; }

This loop will keep on executing and printing the names of the nine justices at every iteration until it reaches the end of the array (last element of the array scotus).

5 0
3 years ago
Please list 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
nikklg [1K]

Answer:BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Keep your files organized

Don’t let a student’s desktop become the digital version of his hectic book bag. Set aside a few minutes at the beginning or end of working on an assignment to ensure that students are saving unfinished work somewhere that they will be able to find it next time.

Log off

Logging off is like the digital version of cleaning up after yourself in the classroom. Students need to leave the computer ready for the next user. Logging off is also important to make sure that student work and accounts stay private.

Each person may only use one computer at a time

Computers and peripherals are not to be moved or reconfigured without approval of Lab and Classrooms staff.

Behavior and activities that disturb other users or disrupt the operations of the lab are not allowed. This includes, but is not limited to: physical activities such as "rough-housing," loud music, etc.

Children are only allowed in computer labs if they are well-behaved and supervised at all times. Children may not use the computers or occupy workstation areas. At no time are children to be left unattended.

.Explanation:

sorry about only 9 rules

4 0
3 years ago
In a paragraph of no less than 125 words, explain what netiquette is and how it improves efficiency and productivity in the work
Ierofanga [76]

In very simple terms, netiquette is etiquette on the internet. It is a short form of network etiquette. It represents the importance of proper manners online. Common guidelines for good netiquette include being very courteous and avoiding instances of cyber-bullying. Although the specific protocols governing netiquette may differ depending on the forum being used, it is equally applicable to emails and surfing the internet, message boards, and chatting. In the workplace, netiquette implies that you have polite manners, and that you would want to build up relationships with people. By showing respect to your colleague through proper netiquette, it will show how productive you can be and as result, you will earn respect. Understanding netiquette in the workplace can save you from embarrassing moments. In sending job emails, for instance, always speak clearly and avoid using capitalized words, spelling errors, or slang.

8 0
4 years ago
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
jok3333 [9.3K]
It all depends on the brand of phone to do it yourself but, you can call your cell company and they can do it for you through your account.
3 0
3 years ago
Other questions:
  • If the force of gravity _ then the weight of an object will _
    8·2 answers
  • Space management is a<br> driving method.<br> A. lazy<br> B. defensive<br> C. fast
    14·1 answer
  • Typing which capitals and exclamation points in an email is an example of
    14·1 answer
  • Is brainly bugging out rn? <br> The site isnt like loading completely
    5·1 answer
  • An array A[0..n - 2] contains `n-1` integers from 1 to `n` in increasing order. (Thus one integer in this range is missing.) Des
    11·1 answer
  • Select the education and qualifications that are most helpful for Insurance Services careers. Check all that apply.
    14·2 answers
  • Describe a situation when you would use a conditional statement in a program. Describe the action that would occur when the cond
    10·1 answer
  • The following equations estimate the calories burned when exercising (source):
    11·1 answer
  • TASK 1. JUMBLE ME! Direction: Arrange the jumbled letters to form a word. 1. PEREAM 2. RRENT CU 3. METREMO H 4. TORSISER 5. TANC
    10·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!