1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
13

In many DBMSs where no strict separation of levels is maintained, this one language is used by the DBA and database designers to

define both the conceptual and internal schemas. Otherwise, it is used to specify the conceptual schema only. True or False.
Computers and Technology
1 answer:
marissa [1.9K]3 years ago
5 0

Answer: False

Explanation:

This means that the mappings between the two schemas may be specified in either one of these languages.In most relational DBMSs today, there is no specific language that performs the role of SDL. Instead, the internal schema is specified by a combination of functions, parameters, and specifications related to storage. These permit the DBA staff to control indexing choices and mapping of data to storage

You might be interested in
I think that you can be more stressed out by being the impostor and you can vibe doing task as a crew mate (type your opinion)
Alexandra [31]

Answer:

i feel the same as you tbh

Explanation:

7 0
3 years ago
Read 2 more answers
How good are vw beetle heaters in winter?
Vinvika [58]
It depends on the heater but in most case it works pretty well
7 0
3 years ago
Write a function call using the ebay_fee() function to determine the fee for a selling price of 15.23, storing the result in a v
Sholpan [36]

Answer:

my_fee = ebay_fee(15.23)

Explanation:

Functions are sections of a program that provide a particular outlined procedure, we call a function by writing its name followed by a pair of parenthesis, the function may be designed in a way that it accepts arguments while been called, Like the case of the ebay_fee(15.23). the number within the pair of parenthesis id the argument, and it is the data that the functions will process and return a value afterwards.

7 0
4 years ago
Anomaly detection systems make use of _______________ that describe the services and resources each authorized user or group nor
zhuklara [117]

Answer:

profiles

Explanation:

<h2><u>Fill in the blanks </u></h2>

Anomaly detection systems make use of <u> profiles</u> that describe the services and resources each authorized user or group normally accesses on the network.

5 0
3 years ago
The __________ unit is capable of mimicking the processor and of taking over control of the system bus just like a processor
Elden [556K]

The unit which is capable of mimicking the processor and of taking over control of the system bus just like a processor is: C) direct memory access.

<h3>What is computer memory?</h3>

A computer memory can be defined as the available space on an electronic device that is typically used for the storage of data or any computer related information.

<h3>What is a CPU?</h3>

CPU is an abbreviation for central processing unit and it can be defined as the main components of a computer because it acts as the “brain” of a computer and does all the processing, calculations, and logical control.

In Computer technology, direct memory access simply refers to the unit which is capable of mimicking the computer's processor and taking over control of the system bus just like a processor.

Read more on processing unit here: brainly.com/question/5430107

#SPJ1

Complete Question:

The __________ unit is capable of mimicking the processor and of taking over control of the system bus just like a processor.

A) interrupt-driven I/O

B) I/O channel

C) direct memory access

D) programmed I/O

5 0
2 years ago
Other questions:
  • Jason is an aspiring filmmaker. He manages finance and makes sure that everyone is involved in the project. Which role is Jason
    12·1 answer
  • Write a literal representing the false value in c++.
    11·1 answer
  • There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat
    6·2 answers
  • When reading events in the Event Viewer, you need to recognize the designated levels or classifications. Which of the following
    9·1 answer
  • A location in space is called?
    6·2 answers
  • Write a program in java to enter a character.The program displays the message "uppercase vowel" if entered character is uppercas
    5·1 answer
  • ANY MHA FANS SAY DEKU
    6·1 answer
  • How can you change the block input so that the sprite moves in the opposite direction?
    12·1 answer
  • When is it appropriate to utilize the nat network connection type?
    8·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!