1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
2 years ago
12

In the context of IT jobs in the information systems field. A ____ is responsible for database design and implementation

Computers and Technology
2 answers:
Yuri [45]2 years ago
8 0

Answer: Database Administrator.

A Database Administrator is responsible for any design and implementation of a database in a system. They are also the people who make sure that they can secure and manage all the data in their system to avoid any problems that may occur during its usage.

They also are responsible for keeping track of changes and the accessibility of the users that will be inputting data into the database. This most especially applies to databases that are meant to keep client information and transactions for most companies.

Anton [14]2 years ago
7 0

Answer:

The correct answer is database administrator.

Explanation:

A database administrator (also known as DBA, in English database administrator) is that professional who manages information and communication technologies, being responsible for the technical, technological, scientific, business intelligence and legal aspects of databases. data, and data quality.

His tasks include the following:

  • Implement, support and manage corporate databases.
  • Create and configure relational databases.
  • Be responsible for data integrity and availability.
  • Design, deploy and monitor database servers.
  • Design the distribution of data and storage solutions.
  • Ensure database security, back up and carry out disaster recovery.
  • Plan and implement the provisioning of data and applications.
  • Design contingency plans.
  • Design and create corporate databases of advanced solutions.
  • Analyze and report corporate data that help decision making in business intelligence.
  • Produce diagrams of relational entities and data flow diagrams, schematic normalization, logical and physical location of databases and table parameters.
You might be interested in
A customer states that when she removes the printed pages from her laser printer output tray, the black ink smears all over her
luda_lava [24]

Answer:

B. Fuser unit

Explanation:

Based on the scenario that is being described it can be said that the most likely problem is the Fuser unit. This is a part that plays an important role in the printing process. This unit melts the toner and compresses it in order to leave the impression on the paper with heat. A faulty fuser unit will not compress correctly and leave wet ink on the paper causing it to smear.

7 0
3 years ago
Use blank to prevent friends who have been drinking from driving
GrogVix [38]
Use persuasion, meaning persuade them to stop
5 0
3 years ago
Read 2 more answers
Write an expression that evaluates to 1 more than the value in the location pointed to by the integer pointer variable ip. Thus,
kompoz [17]
*ip+1
ip is a pointer to int
*ip is that   int   so *ip+1 is the value at ip  plus 1
6 0
3 years ago
 How does critically analyzing technology add value to interactions with people in personal and professional contexts?
AysviL [449]

Answer:

Critically analyzing technology helps realize the need for improvement, extension and creativity that technology can bring towards advancement basically both for personal interactions and in professional settings.

Explanation:

It's helps build the need of Technological inclusion for productivity. Thank you.

8 0
3 years ago
Read 2 more answers
Conduct a site research on a specific property using the concepts discussed during this week.
Anni [7]

Answer:Penis!

Explanation:

Haha! Enjoy your day! Hahahahaha!

8 0
2 years ago
Other questions:
  • What software refers to the on authorized and illegal duplication or sale of software
    10·1 answer
  • What technique creates different hashes for the same password? ccna routing protocols final answers?
    7·1 answer
  • A keyboard and touch screen are the most common of ________ devices. select one:
    11·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • Write a Program in C language using arrays:
    14·1 answer
  • Which feature is used to summarize data from multiple worksheets but does not require that the data be in the same location on e
    12·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • What is wrong with the following code?
    11·1 answer
  • Helllllllllppppppppppp
    9·1 answer
  • Which of the following is the best way to keep up with trends in your industry?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!