1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
3 years ago
12

On the server side, the database environment must be properly configured to respond to clients' requests in the fastest way poss

ible, while making optimum use of existing resources. The activities required to achieve this goal are commonly referred to as________
Computers and Technology
1 answer:
Paraphin [41]3 years ago
5 0

Answer:

<em>DBMS Performance </em>

Explanation:

Database tuning <em>defines a range of activities that are used to maximize and homogenize a database's output.</em>

This typically coincides with query tuning, but applies to database file layout, DBMS software selection, and database environment setup (operating system, CPU).

Database tuning helps to optimize the use of machine resources in order to carry out work as efficiently and quickly as possible.

Many systems are built to handle their use of system resources, but there is still plenty of space for enhancing their performance by tailoring their server and DBMS settings and configuration.

You might be interested in
What landforms are likely to form at this boundary
Paha777 [63]
<span>Landforms that could be created at convergent boundaries would consist of: volcanoes, mountains, trenches, volcanic islands, and even deserts could result from effects of converging boundaries. The landforms are mountains.</span>
3 0
3 years ago
What Two external audio recorders are most commonly used ??
zimovet [89]

Answer:

Very few recorders have built-in microphones that are useful for field reporting. Does the recorder have XLR (professional grade) input, Tip-Ring Sleeve (TRS) input or just a mini jack? Format – There are two types of audio files: compressed and uncompressed. Cheap audio recorders will compress all of the audio it captures.

Explanation:

hope this helps mark as brainiest.

3 0
3 years ago
Your company has 1,000 users in a Microsoft Office 365 subscription. A Power BI administrator named Admin1 creates 20 dashboards
AysviL [449]

Answer:

Yes, it is.

Explanation:

Yes it will surely achieve the goal. When there is no license for user, then he/she will not access the dashboard.

7 0
3 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
2 years ago
A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.
Ira Lisetskai [31]
Answer:

0

Explanation:
In the lists, indexation starts from 0, because of that in if statement we compare item[0] which is 'male' and 'male', and then males is itterated within for loop.
8 0
2 years ago
Read 2 more answers
Other questions:
  • A tool that is used to search for and gather data from a page on the internet is called a ?
    11·2 answers
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • What does the % find?
    9·2 answers
  • Which of the following are the dimensions of feasibility? Group of answer choices cost, schedule, technical, and organizational
    14·1 answer
  • What is the most effective way to demonstrate being prepared for an interview?
    13·1 answer
  • Write a Java program that prints out a 4x4 square (like the one below)
    11·1 answer
  • You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the perm
    15·1 answer
  • Hello help me with this please if you want to thank you I would give brainlist!
    13·2 answers
  • The Arizona Department of Transportation has offices throughout the state. State documents are stored on a large server in a cen
    5·2 answers
  • The term information technology was first used what year?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!