1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
14

Your textbook discussed a record store example where one user could perform a query to determine which recordings had a track le

ngth of four minutes or more, and another user could perform an analysis to determine the distribution of recordings as they relate to the different categories. What database advantage is this an example of?
Computers and Technology
1 answer:
gladu [14]3 years ago
3 0

Answer:

The answer is "Increased flexibility".

Explanation:

In the given question some information is missing that is the option of the question which can be described as follows:

A. Enhance scalability and efficiency

B. Enhance data security

C. Reducing data duplication

D. Increased flexibility

Flexibility is being used as an object for different types of applications. It is an engineering system which is that provides an easy way for all the scheme to respond to insecurity so, that its value is maintained or increased, It is also known as its key component, and certain option was incorrect, which can be described as follows:

  • In option A, It is wrong because it is used in business data.
  • In option B, It is wrong because it provides security.
  • In option C, It removes duplicate data that's why it is wrong.
You might be interested in
In Web design, What kind of tag is referred to as fixed ?<br>​
Tpy6a [65]

Answer:

Most HTML tags are fixed

Explanation:

There are various kind of technology one can use for designing web application. A web designer should know HTML, CSS and other basic building block of web development.

HTML meaning hypertext markup language is used to define the basic structure of a web page . HTML has tags which are used to declare the contents on the web page. The tags includes anchor(<a>), paragraph tag(<p>),header tag(<h1>).

CSS which is known as Cascading style sheet describes the presentation of the web pages.

Other tags in HTML includes <img>, <link>, <ul>  etc and generally this tags are HTML tags which are fixed for a particular kind of job . For example you can't use an image tag <img>   to enclose video instead you use a video tag <video> tag. The header tag <h1> cannot be represented like a paragrapgh tag<p> on the web page. The both of them serve specific purpose and are fixed.  

7 0
3 years ago
In addition to format commands that are found in the ribbon, which option is available for more extensive formatting?
eimsori [14]

Answer:

A

Explanation:

5 0
3 years ago
6.8 Code Practice<br> please can have some help please
babymother [125]
Sure what is the question though
7 0
3 years ago
Determine the factors using computer failures and defects​
ladessa [460]

Answer:

Voltage spike – This is a momentary change in the supply of electric power. It’s important to remember that the size of the transient can range from just milliseconds to longer periods of time. Even a small power glitch can damage a computer and corrupt data. If the screen goes blank during a thunderstorm, it’s likely that a voltage spike is responsible.

Circuit board fails with no visible indication of damage – This is the typical scenario: A computer goes down. A defective circuit board is suspected of the fault, but an inspection reveals no signs of physical damage. A replacement board is installed and operation resumes.

Failure to load software upgrades – Computer software often comes with various bugs, or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to corruption of data.

Failure to keep virus protection up to date – There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware infected computer is slow data processing.

Inadequate cooling – Computers produce heat, and the more data they process, the more heat must be eliminated. Servers, the “brains” of computers, fail under excess heat, so adequate cooling is essential.

Environment – If a computer room has a dedicated cooling system, there may be an opportunity to closely control the heat. If the cooling is shared with other equipment or the space contains offices, we often face a more challenging task. People have comfort needs different to those of computers.

Loss of Power, PDU fails – Power Distribution Units (PDU’s) are similar to power bars in homes and offices. They distribute power to different components in a computer room, and are usually located next to the server racks. PDU’s suffer a range of problems. Receptacles wear out and can be the sources of bad contacts, and moisture can lead to corrosion.

UPS batteries – Uninterruptible Power Supply (UPS) batteries are found in computer rooms. Most often, they are used to provide continuous power for a limited time, during an outage. Depending on how it’s used and the design of the battery, the life span can be as short as 4-5 years for what is considered a “10 year life” battery. Elevated room temperatures will shorten the life of any battery. Even a small facility such as a dentist office uses UPS batteries.

Transfer switch battery defective – This can be an indication that the site lacks an effective battery maintenance program. It can also be a sign that the transfer switch is “frozen” in position. Preventive maintenance could help avoid a breakdown.

Failure of standby power to synchronize (come on line) – When electric power from the grid disappears, standby power takes over in two different ways. In a small computer room, the focus is on turning computers off in a controlled manner. A fully charged UPS will provide power for 10-15 minutes to allow a computer to save its data and turn off. In a larger facility, it’s the matter of keeping cooling and power going long enough to give the standby generator an opportunity to “synchronize,” to get up to a rate of speed sufficient to power the infrastructure and continue data processing.

Diesel fuel contaminated – Most medium to large facilities have generators powered by diesel fuel, which can become contaminated and useless when a power outage occurs. Water is usually the culprit. Regular fuel testing is necessary to avoid contamination.

Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during normal operation, so it’s a good practice to back up stored data on a regular basis. Backing up means creating a spare data storage. Failure of a tape or disk drive is often, but not always, proceeded by noise. Opening the unit to attempt data restoration is better left to a professional.

Sprinkler system turns on above the servers – Where a data room is protected by a water sprinkler system, a small spill can damage the electronic components. This is particularly true in cases where sprinkler heads are located directly above the servers.

Computers are crucial to business today, but there are so many things that can cause them to fail. By addressing the above common culprits, you could help reduce the overall risk of your computer systems failing.

Explantion: I hope this helps!!!!! :)

4 0
3 years ago
How do you know when a spreadsheet object is active in a powerpoint presentation?
Ira Lisetskai [31]
It should be under lined, when you press it it should have a different colour
4 0
4 years ago
Other questions:
  • A customer in a store is purchasing 5 items. Write a python program that asks for the price of each item and display the subtota
    14·1 answer
  • Determine the “answer” to the formula according to the spreadsheet below:<br><br> =A3 + B4 + D2.
    15·1 answer
  • 4-Translate the following C program to MIPS assembly program (Please explain each instruction in your code by a comment and subm
    6·1 answer
  • Write a algorithm to attend birthday party​
    8·2 answers
  • If a client is found _________ the NAP will attempt to make it _______. Group of answer choices A. non-compliant, compliant B. s
    13·2 answers
  • The algorithm and flowchart
    9·1 answer
  • What is the cffa act
    5·2 answers
  • How are IP addresses usually written?
    7·1 answer
  • A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
    11·1 answer
  • Consider the following code: def tryIt(b): for i in range(len(b)): b[i] = b[i] + 100 #***********MAIN************ x = [] x = [56
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!