1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fofino [41]
3 years ago
9

Howie is a business analyst who is given access to the database of a product prior to its launch. He needs to understand the dat

a presented and take appropriate action. Which of the following is Howie most likely to do?
A) Send the database back to the source to interpret the data
B) Uses the data present in the database in its raw format
C) Encrypt the data to secure the product's authenticity
D) Use SQL or graphical tools to query the database
Computers and Technology
1 answer:
Kisachek [45]3 years ago
6 0

Answer:

D) use SQL or graphical tools to query the database            

Explanation:

To query the database using SQL or graphical tools will help Howie to retrieve bulk of records from the database according to his requirements and it will help to understand and work with the data in a better way than using the data in raw form.

SQL is a language of database used to manipulate and manage the data in the relational database and to query the database.

It is an easy and faster way to query using SQL or graphical tools because no coding is required here.

Different graphical tools are used to present the data in the database in a way that can be easily understood by a person. Different interfaces are provided to visualize the database tables or schema diagrammatically e.g in the form of graphs etc. Different views of the database can be provided to different users according to their requirement and what information they required to be presented.

You might be interested in
A loop decision point for an algorithm consists of three features: an initial value, a set of actions to be performed, and a(n)
pychu [463]

Answer:

Option c is the correct answer for the above question.

Explanation:

A loop is used to repeat some lines in some specific times which depends on some conditions of the loop. If a person wants to print "welcome" on 5 times then he can do this by two ways one is writing a print statement 5 times and the other is states a loop that executes 5 times through condition. The loop is described or written by three necessary points which are:-

  1. The fist is to initialize the initial value which tells the compiler for the starting point of the loop.
  2. The second is to any action for that condition variable which takes the loop for the direction of ending points.
  3. The third is a condition that defines the ending point of the loop.

The above question also states about the loop in which first and second points are given then the third point is necessary to complete the sentence which is states in option c. Hence the option c is correct while the other is not because--

  • Option 'a' states about the class operator which is not the part of the loop.
  • Option b states about the documentation plan which is also not the part of the loop.

5 0
4 years ago
you have just received a new hdd so you connect it to your computer. the disk manager software recognizes the disk but when you
crimeas [40]

The most likely problem is the disk is not low-level formatted. Windows' Disk Management system software gives you the ability to carry out sophisticated storage functions.

Windows' Disk Management system software gives you the ability to carry out sophisticated storage functions. Hard disk software is used on hard disk drives to complete a variety of tasks, such as file system checks and error checking, backups, defragmentation, data recovery, and partitioning.

Initializing a new drive can be used to set up a new drive.

See Expand a basic volume to extend a volume into space that isn't already occupied by a volume on the same drive.

Utility software called disk management tools is used to manage data on disk by carrying out various operations on it. Additionally, they carry out tasks like managing drives, formatting disks, checking disks, and partitioning devices.

To know more about Disk Management click here:

brainly.com/question/2742036

#SPJ4

8 0
2 years ago
Read 2 more answers
[2]<br> (c) Describe how the microprocessor can determine when to sound the clock alarm.
Oliga [24]

Answer:

The first is to set .As soon as the timer is set,the microprocessor starts counting. When the number it counts to is the same as the number of cycles.

7 0
2 years ago
Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
nordsb [41]

Answer:

a. partial interval

Explanation:

Partial Interval data recording method of data collection involves recording whether an event occurs or does not during a defined interval.

It is different than <em>whole interval</em> data recording because partial interval doesn't occur throughout the entire interval.

In partial interval recording, <em>discrete behaviors</em> are observed. For example, this kind of behavior can be a person swearing or hitting to someone, a student participating in class discussions etc.

8 0
3 years ago
Which of the following is NOT an example of one of the six primary ways businesses use the Internet?
pishuonlain [190]
The answer is c to manufacture new products because it is not hardware the internet can not produce products
3 0
4 years ago
Read 2 more answers
Other questions:
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    10·1 answer
  • What's the best option if you can't show your PowerPoint presentation at all?
    9·2 answers
  • You notice your glove is torn; what should you do
    14·2 answers
  • Green Field county stadium is planning to conduct a cricket match between two teams A and B. A large crowd is expected in the st
    8·1 answer
  • Unicode is a world standard to represent _________________
    10·1 answer
  • Does anyone know the answer for question d (questions in the picture btw)
    7·1 answer
  • An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
    8·1 answer
  • What is are the html tags plss anyone​
    8·1 answer
  • Write a program that will add the content of two counters every 45 seconds and place the result in an integer register.
    7·1 answer
  • Computing is the provision of IT services on demand.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!