Answer:
b. data entry slows as every INSERT , UPDATE, or DELETE statement must also update every index.
Explanation:
This process help to improve the speed of get data , it takes each element in the indexed column and save the location to get faster the data. But if you index every attribute in a table it going to take a lot of time locating each column in the respective index in each query(update, delete and insert). For that reason is necesary be carefull with this process and only put index in the relevant columns
Answer:
import java.util.Scanner;
public class ANot {
public static void main(String[] args) {
Scanner in = new Scanner (System.in);
System.out.println("How many cookies did you eat today");
int numOfCookies = in.nextInt();
double numCalories = (numOfCookies*300)/4;
System.out.println("The total number of calories you consumed in "+numOfCookies+" cookies is " +
" "+numCalories);
}
}
Explanation:
This code is implemented in Java.
- We know from the question that 4 cookies contain 300 calories
- Therefore number of calories consumed = (number of cookies eaten*300)/4
- To implement this in java we used the scanner class to prompt user for the input
- save the input to a variable and write mathematical expression for the number of calories consumed
- Then output the result
Answer
The intranet security model
Explanation:
This is an enterprise system that processes user information for security and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.
The intranet security model is an efficient security procedure that incorporates web security access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.
Answer:
c.
Explanation:
Plagiarism refers to the act of stealing another person's thought, ideas, or expressions. Therefore it can be said that out of all the answers provided the one that is most likely to be considered plagiarism would be using materials from a source without proper citation. This is because you are using another individual's work and not giving them credit for having created that work, instead you are taking credit for it by not citing the actual author.
Answer:
Explanation:
Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.
Some of the necessary safety conditions that should be taken include;
1) Appropriate research about the software including taking more about the vendors and reviews.
2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.
3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.
4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.