1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
4 years ago
9

A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in

the use of selected database management systems, and stay abreast of emerging technologies and new design approaches.a)trueb)flase
Computers and Technology
1 answer:
Alexus [3.1K]4 years ago
8 0

Answer: True

Explanation:

 Yes, the given statement is true that the DBA (Database administrator) utilize particular programming to store and arrange information.

The DBA is the proper understanding of the comprehension of the key business of an association, be capable in the utilization of chose database the executives frameworks, and remain side by side of developing advancements and new plan draws near.

The main purpose of the database administrator that it incorporate scope organization, establishment, setup, database plan, movement, execution checking, security, investigating, just as reinforcement and information recovery.

You might be interested in
Can you guys give some samples of STEM-related studies?​
anygoal [31]

Answer:

D :)))))

Explanation:

hope this helps

5 0
3 years ago
Read 2 more answers
Consider the following schema for customer: (id, name, street, city, state, zip, phone), in which customers are uniquely determi
Art [367]

Answer:

Super key is a set of attributes that uniquely identifies all attributes in a relation.Super keys are more than candidate key.

Explanation:

For example in the given schema where

Customer: (id , name , street , city,state,zip,phone)

We have a relation we check super keys by following dependencies

Functional Dependencies                          Super Key

id                                                                     YES

name                                                               YES

id , name -> street , city,state,zip,phone       YES

id , street  ->name , city,state,zip,phone       YES

id,city ->name , street ,state,zip,phone         YES

id,state ->name , street ,city,zip,phone         YES

id,phone  ->name , street ,state,zip,city        YES

id , name , street                                             YES

id , name , street , city                                    YES

id , name , street , city,state                          YES

id , name , street , city,state,zip,phone         YES

All these are uniquely identified

All these are super key but in reverse they are not super key such as

street , city,state,zip,phone->id , name        No

8 0
3 years ago
Wanda manages an application that fluctuates in usage quite a bit. Sometimes it uses quite a few servers with lots of memory and
TEA [102]

Answer:

c. Elasticity

Explanation:

When referring to Cloud Servers this capability is known as Elasticity. It basically describes how able and efficient a server is to automatically implement resources and remove resources in order meet the specific amount of demand at any given moment. Many times a server will not have much demand but will still have all the resources being used by the server. Being able to remove these unused resources so that they are available for other usage is what makes the servers elastic.

8 0
3 years ago
Discuss in detail why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal
dolphi86 [110]

A write blocker is any tool that permits read-only access to data storage devices without compromising the integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of custody. NIST‘s general write blocking requirements hold that:

<span>The tool shall not allow a protected drive to be changed.The tool shall not prevent obtaining any information from or about any drive.<span>The tool shall not prevent any operations to a drive that is not protected.</span></span>
8 0
3 years ago
Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software
kow [346]

Answer:

A class is an instance of its object

Explanation:

6 0
3 years ago
Other questions:
  • In what country did true printing first take place?
    12·2 answers
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • One of the first signals that an organization is making progress in the development of its IR program, specifically in the devel
    6·1 answer
  • If you have configured your prompt so that it does not show your working directory, you can use the ____ command to verify in wh
    15·1 answer
  • Select the correct answer.
    12·1 answer
  • What color mode would you use when designing for web &amp; devices?
    9·1 answer
  • Aubrey uses the following formula to calculate a required value. Which elements of the formula use mixed cell referencing?
    13·2 answers
  • Impact of information technology in the society​
    11·1 answer
  • If you answer I will mark brainliest!!! I want to be able to see two websites on my screen at the same time, how do I do that on
    9·1 answer
  • what extension of nat allows several hundred workstations to access the internet with a single public internet address
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!