1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slega [8]
3 years ago
14

each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S

QL A. A means of locating a particular record within a file B. The process of extracting hidden information C. A storage system that provides efficient access to randomly chosen items D. A structural unit (with rows and columns) in a popular database model E. A system to guard against database errors due to performing transactions concurrently F. An item used to identify records uniquely G. Performs database operations requested by application software H. A popular language that implements relational database operations I. A "road map" of a particular database's design J. To "unwind" a transaction
Computers and Technology
1 answer:
ikadub [295]3 years ago
5 0

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

You might be interested in
Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
Vlad [161]

Answer:

Install in Safe Mode

Explanation:

If a system is corrupted with malware, installing an antivirus or anti-malware might not be possible. The malware can hide in a system and it can prevent the anti malware software from installing or scanning on the system.

Running your system in safe mode and install is the best option. Safe mode blocks third party programs and hardware drivers. A malware should not start when a system is in safe mode, therefore you can install the anti-malware and scan to remove all the malware from your system.

5 0
3 years ago
Find the errors<br><br> Look to the following code and fix the errors
ivanzaharov [21]
Upper case and lower case problem
7 0
3 years ago
Robot is an example of which generation computer?​
n200080 [17]

Robot is an example of Fifth Generation Computer.

I hope it's help you...

Thanks♥♥

6 0
3 years ago
write a function that returns a list, where each member of list contains previous day’s value multiplied by 2.​
sergeinik [125]

Answer:

Explanation:

The following code is written in Java, the function takes in a list with the previous day's values. The function then uses that list, loops through it and multiplies each individual value by 2 and returns the modified list. The first red  square represents the test case for the function, while the second red square in the image represents the output.

 public static ArrayList<Integer> doubleIt(ArrayList<Integer> mylist) {

       for (int x = 0; x<mylist.size(); x++) {

           mylist.set(x, mylist.get(x)*2);

       }

       return mylist;

   }

5 0
3 years ago
Which type of computer allows the user to enter text by handwriting
mixer [17]

Answer:Pen computing refers to any computer user-interface using a pen or stylus and tablet, over input devices such as a keyboard or a mouse.

4 0
4 years ago
Other questions:
  • Which of the following is the largest disadvantage of wind power?
    12·2 answers
  • What does the Auto Fill tool do?
    15·2 answers
  • Universal Containers is implementing a community of High-Volume Community users. Community users should be able to see records a
    12·1 answer
  • 30 points!! What should I do if I plug my computer in and it starts making noises and sounds and it starts smelling.
    9·1 answer
  • In the United States, everyone is guaranteed work true or false
    13·1 answer
  • sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses sunglasses i am a failure sun
    7·2 answers
  • List six common raster image file types.
    9·1 answer
  • What's this little?<br>​
    9·1 answer
  • How to test someone elese internet speed from a distance
    15·1 answer
  • Does survey monkey remembers you already took survey?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!