1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fofino [41]
2 years ago
9

Howie is a business analyst who is given access to the database of a product prior to its launch. He needs to understand the dat

a presented and take appropriate action. Which of the following is Howie most likely to do?
A) Send the database back to the source to interpret the data
B) Uses the data present in the database in its raw format
C) Encrypt the data to secure the product's authenticity
D) Use SQL or graphical tools to query the database
Computers and Technology
1 answer:
Kisachek [45]2 years ago
6 0

Answer:

D) use SQL or graphical tools to query the database            

Explanation:

To query the database using SQL or graphical tools will help Howie to retrieve bulk of records from the database according to his requirements and it will help to understand and work with the data in a better way than using the data in raw form.

SQL is a language of database used to manipulate and manage the data in the relational database and to query the database.

It is an easy and faster way to query using SQL or graphical tools because no coding is required here.

Different graphical tools are used to present the data in the database in a way that can be easily understood by a person. Different interfaces are provided to visualize the database tables or schema diagrammatically e.g in the form of graphs etc. Different views of the database can be provided to different users according to their requirement and what information they required to be presented.

You might be interested in
A brown outline around a frame is an indication of which tool?​
zimovet [89]

Answer:

Direct Selection Tool

Explanation:

The Direct Selection tool is a tool that allows the selection of a single object or a single path such that an object already grouped with other objects can be directly and moved to a desired location

The Direct Selection tool can be used to select a container's content including graphics which are imported and specific points or paths of a figure or text to allow for drawing, text editing or to edit paths.

6 0
2 years ago
Jaboooo helloooo are u there
Fed [463]
?????????????????????
8 0
2 years ago
Read 2 more answers
Case Project 9-4: Troubleshoot an IP configurationYou work at a help desk and have just received a call from an employee who say
Svetllana [295]

Answer:

To get the IP address and other information on the workstation, type 'ipconfig' for windows or 'ifconfig' or Linux and press the return key.

The subnet mask is a class B type and 169.254.14.11 IP address shows that the workstation cannot access the DHCP server, so the IP address is not properly configured for network connection.

Explanation:

A computer network is an interconnection and intercommunication of two or more computer devices. All devices in a network must have an IP address, which can be static or dynamic from a DHCP server.

When a computer is configured to receive IP address from a DHCP server, but cannot reach the server, the IP address from the range of 169 is automatically assigned to it but still would not be able to communicate with other devices in the network.

4 0
2 years ago
To ensure that the original value of an argument passed to a method remains unchanged after returning from the method, you shoul
lakkis [162]

Answer:

false

Explanation:

A reference parameter passed into the method can be changed by the method, when the method changes all of a parameter's variables, the parameter will keep the changes after the method is returned.

4 0
3 years ago
Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted acces
Ber [7]

Answer:

B. Availability

Explanation:

The three principles of the CIA triad are Confidentiality, Integrity and Availability.

Confidentiality means guiding data or information from getting to the wrong people. In confidentiality, only authorized people are meant to see the data.

Integrity on another hand, makes sure that throughout the life-cycle of a particular information or data, the data/information is kept consistent, accurate, complete and even reliable.

Availability ensures that authorized subjects have prompt, undelayed and uninterrupted access to objects - data or information.

Other options supplied  in the question - identification, encryption, layering - are not directly part of the CIA Triad. So the answer to the question is availability.

4 0
2 years ago
Other questions:
  • Which BI tool or technique would be most useful in predicting the likelihood of a fire in a building? a. Data mining b. Dashboar
    9·1 answer
  • Which of the following is a feature that is in the Excel program and NOT in Word? (Select all that apply.)
    14·1 answer
  • "what is the #1 resource used when researching a product online?"
    5·1 answer
  • What is the term for sending emails that imitate legitimate companies?
    6·2 answers
  • How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not
    10·1 answer
  • The physical elements needed for the production of digital media, such as computers, servers, and so on are called the {Blank}
    8·1 answer
  • The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1
    11·1 answer
  • Does the security burden fall primarily on the user? On
    10·1 answer
  • What are the advantages of mine shaft gear and the disadvantaged​
    9·1 answer
  • Explain why it is important that the device registration is the last thing that is done in the initialization routine of a devic
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!