1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex_Xolod [135]
3 years ago
12

A supermarket chain wants you to implement an in-memory database that can be used to access facts about the products they sell.

Although a snapshot of this database will be periodically copied to disk, its contents fit in memory, and your component of the application will operate only on data stored in memory.
Here are the requirements specified by the managers of the supermarket chain:__________.
A) They want to be able to retrieve product records by specifying the name of the product.
B) They want to be able to specify the first n characters of a product name and to retrieve all records that begin with those characters.
C) They want the time required to retrieve a record to be as efficient as possible – on the order of 20 operations per retrieval, given a database of approximately one million records.
D) They want to be able to increase the size of the database – adding large sets of new records – without taking the system offline.
Computers and Technology
1 answer:
victus00 [196]3 years ago
5 0

Answer:

D) They want to be able to increase the size of the database- adding large sets of new record - without taking the system offline.

Explanation:

The in memory is used in database to increase the storage size. In memory database management system primarily relies on the main memory. All the data will be stored and managed on the main memory. This is used in the systems where there is need for data access for large files, There can be many risks associated with this setup which can even lead to server failure.

You might be interested in
Which directive is used when defining 64-bit IEEE long reals?
Taya2010 [7]

Answer:

The answer is "Option b".

Explanation:

In the project of IEEE-754 to define 64 -bit we require a REAL8 double precision that is equal to 8 bytes and 64 bit, and it is also used for floating-point arithmetic, and other options were not correct that can be described as follows:

  • In option a, REAL4 is used to define 32-bit, that's why it is not correct.
  • In option c, This type of declaration is not valid in IEEE, that's why it is wrong.
  • In option d, The REAL is a keyword that is used to define a value but in this, there is no value to define, that's why it is wrong.

7 0
3 years ago
How would Microsoft Word inform you of the error in the sentence below? (Tip: The error is in bold.)
Artist 52 [7]
It's the second answer since there's not really an error for Microsoft Word to actually catch.
3 0
3 years ago
An 8x16 font isstored in _________________ bytes.<br> ? 8<br> ? 16<br> ? 4<br> ? 20
stiv31 [10]

Answer:

The answer to this question is 16 bytes.

Explanation:

8x16 font means it contains 16 rows by 8 columns of 1-bit pixel ( picture element ).

rows=16.

columns=8.

8 bit = 1 byte.

8x1 = 1 byte.

8x16 = 16 bytes.

So 8x16 font size requires 16 bytes of data to store a character.Hence we conclude that the answer is 16 bytes.

8 0
3 years ago
type the correct answer in the box. Spell all words correctly. Which element of the presentation software can you use to add cal
Anuta_ua [19.1K]

Answer:

The element of the presentation software that can be used to add callous and banners is SHAPES

Using the INSERT TAB, you can add callouts and banners to a slide.

Explanation:

If you want to add callouts and banners to a slide, the presentation software that can be used is PowerPoint.

The element that is used to add it is called shapes and can be found in the Insert Tab.

6 0
3 years ago
To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
NARA [144]
The answer is B, Both Jill and Karl are correct.
7 0
3 years ago
Other questions:
  • What is a Software Quality Assurance Audit?
    12·1 answer
  • Roadband is a network connection that
    15·1 answer
  • Although you are not a full administrator, you are asked to manage a protected document, allowing customized access to any inter
    7·1 answer
  • Is a pocket watch consider a computer
    15·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • 1.What is the output of the following program? [10 Marks]namespace ConsoleApp1{class Program{static void Main(string[] args){int
    13·1 answer
  • Given that the input A is false, the input B is false, and the input C is true, what is the resulting value of the output?
    12·1 answer
  • What is a phone made out of dna
    15·1 answer
  • Explain how you would set up a Demilitarized Zone on. You have 25 workstations and a server on your site. Explain what additiona
    5·1 answer
  • Dropdown Complete the sentence. To protect a web-based database, you should apply to any online forms that add data to it. princ
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!