1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
11

Usually, the same software that is used to construct and populate the database, that is, the DBMS, is also used to present ____.

Computers and Technology
1 answer:
anygoal [31]3 years ago
3 0

Answer: Queries

Explanation: A database management system(DBMS) is a system that contains the data/information in the form of content or tables.There is a software that can populate the system by the excess data usually found in the SQL format

A query is the demand for the extraction of the information that is present in the database table or content.It helps in presenting extracted data in the readable data.The most commonly used language for the queries is the SQL (structured query language) queries.Thus, the correct option is queries.

You might be interested in
Which statement is true about laptops? Laptops use fewer components than desktops use. Most of the internal components that are
elena-14-01-66 [18.8K]

Answer:

Option 2 is correct.

Explanation:

Option 2 is correct because most of the components used in laptop is far different from Desktops. They are not able to fix in desktops. They are designed specially for laptops.

8 0
3 years ago
Read 2 more answers
Aye yo, how do I get rid of an already placed end crystal? I thought it looked cool to build in my minecraft survival house, and
SpyIntel [72]

Answer:

they can be removed safely if they're immersed in water first.

Explanation:

8 0
3 years ago
Read 2 more answers
What are 4 visual rules of image use in your design
Anna [14]

Answer:

Explanation:

Use context-relevant images

Have a focal point

Provide high-quality images

Don't forget about accessibility

4 0
3 years ago
Which scenario could be represented by the given graph?
vredina [299]

Can you show a picture of the graph?

6 0
3 years ago
A common approach for managing the issuance of asymmetric keys is based on the _____________________________ mechanism, which ex
Nady [450]

Answer: RSA infrastructure

Explanation:

Using this infrastructure we can implement asymmetric cryptography using a pair of public key and private key. It works on the mechanism that if one of the key is used for encryption the other key is used to decrypt the message.

3 0
3 years ago
Other questions:
  • Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
    10·1 answer
  • Which is the most likely reason why scientists change a model?
    12·2 answers
  • Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
    11·1 answer
  • The following algorithm computes the average height for a list of basketball player heights. Initialize a variable sum to 0. For
    11·2 answers
  • What happens when you press the Enter key at the end of a line of bulleted text?
    14·2 answers
  • Which type of financial institution typically has membership requirements?
    14·1 answer
  • The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new
    8·1 answer
  • How can you say that a painting is real? ​
    7·2 answers
  • 2. Why is there no country code for the USA?
    7·2 answers
  • PowerPoint Online automatically saves your presentation to what Office Online application?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!