1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slega [8]
3 years ago
14

each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S

QL A. A means of locating a particular record within a file B. The process of extracting hidden information C. A storage system that provides efficient access to randomly chosen items D. A structural unit (with rows and columns) in a popular database model E. A system to guard against database errors due to performing transactions concurrently F. An item used to identify records uniquely G. Performs database operations requested by application software H. A popular language that implements relational database operations I. A "road map" of a particular database's design J. To "unwind" a transaction
Computers and Technology
1 answer:
ikadub [295]3 years ago
5 0

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

You might be interested in
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,
balandron [24]

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
5 0
3 years ago
Read 2 more answers
Technician A says that reprogramming a PCM using the J2534 system requires a factory scan tool, while Technician B says it requi
Dmitry [639]

Answer:

Technician B only

Explanation:

6 0
3 years ago
When sending a file as an e-mail attachment, the save &amp; send option can be found by clicking on which tab? insert file home
aleksklad [387]
I belive that it is .insert.
5 0
3 years ago
To use an outline for writing a formal business document, what should you
nydimaria [60]

Answer: D. enter each major point from the outline on a separate line

6 0
3 years ago
Why are all the expert and tutor verified answers wrong???
posledela
They’re right, most of the time the question you ask can confuse them or you may say it incorrect etc.
3 0
2 years ago
Read 2 more answers
Other questions:
  • Where does the oracle11g server store information about objects in the database, including information about constraints?
    15·1 answer
  • Any malware software that covertly gathers user information without the user s knowledge, is known as ______ .
    12·1 answer
  • You can display content variations to mobile, tablet or desktop users.
    12·1 answer
  • What does the merge &amp; center button in the alignment group on the home tab do?
    8·1 answer
  • Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its
    13·1 answer
  • When you open a browser window, it open in a _____. <br> a. fieldb. folderc. menud. window?
    7·1 answer
  • Combining two or more cells to make one is called​
    8·1 answer
  • NumA=2<br> for count range (5,8)<br> numA=numA+count <br> print(numA)
    15·1 answer
  • Example of Not a computer characteristics example
    12·1 answer
  • Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!