1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tpy6a [65]
4 years ago
11

The _____ component of a database management system (dbms) is used to add, delete, modify, and retrieve records from a database.

Computers and Technology
2 answers:
evablogger [386]4 years ago
7 0

Answer:

a. data manipulation

Explanation:

Data manipulation is to  used to add, delete, modify, and retrieve records from a database.  One of the most popular data manipulation language is that of Structured Query Language (SQL), which is used to retrieve and manipulate data in a relational database.

The main purpose of data manipulation, is to make data easier to read and more organized. For example, a log of data could be organized in alphabetical order, or according to time, e.t.c. This will allow those that are interested in the data to fully understand, see trends and draw up conclusions easily.

ikadub [295]4 years ago
3 0
The correct answer is:  [A]:  "data manipulation" .
________________________________________________________
You might be interested in
What is the difference between requirements and controls in the security process? Give examples of each.
konstantin123 [22]

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

4 0
3 years ago
Which best compares portrait and landscape orientations?
julsineya [31]
#2: Portrait taller than wide & landscape wider than tall
8 0
3 years ago
A customer has an application that is used by enterprise customers outside of AWS. Some of these customers use legacy firewalls
madam [21]

Answer:

Switch the two existing EC2 instances for an auto scaling group and registered them with the network load balancer

Create a network load balancer with an interface in each subnet, and assign a static IP address to each subnet.

Explanation:

3 0
3 years ago
You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
Vikki [24]

Answer:

C. real time web access

Explanation:

Real time web access can be used to demonstrate how to do something special on the web, such as displaying articles found on websites that support your topic.

It can also be used to it provide a sense of immediacy to your speech.

It involves employing a live internet feed as a visual media or information resource during a speech, that is using a real time video online to deliver your speech.

5 0
3 years ago
What is cyber ethics​
RoseWind [281]

Answer:

cyber ethics​

Explanation:

code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as "Don't take what doesn't belong to you" and "Do not harm others," we must act responsibly in the cyber world.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What devices are used to connect computers to a network?
    10·1 answer
  • Which is the responsibility of a software architect?
    11·1 answer
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • What are the major features of a successful ethics training program and communication systems? Think of an example of a company
    13·1 answer
  • To view the results of a saved query, right-click the query in the Navigation Pane and click ____ on the shortcut menu.
    7·1 answer
  • You locate a web page that includes "edu" in the address, along with other words and symbols. the page is simple—a plain backgro
    8·1 answer
  • _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a
    12·1 answer
  • Someone claims that the big O notation does not make sense at all, and they give the following example. An algorithm A that proc
    15·1 answer
  • On net, is technology good or bad for society? Please explain, support your argument, I’ll mark brainliest
    9·2 answers
  • Match each of the following network types to its definition: I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geogr
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!