1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
2 years ago
13

In many DBMSs where no strict separation of levels is maintained, this one language is used by the DBA and database designers to

define both the conceptual and internal schemas. Otherwise, it is used to specify the conceptual schema only. True or False.
Computers and Technology
1 answer:
marissa [1.9K]2 years ago
5 0

Answer: False

Explanation:

This means that the mappings between the two schemas may be specified in either one of these languages.In most relational DBMSs today, there is no specific language that performs the role of SDL. Instead, the internal schema is specified by a combination of functions, parameters, and specifications related to storage. These permit the DBA staff to control indexing choices and mapping of data to storage

You might be interested in
What responds to both visual appeal and functional needs? (1 point) A.) applied art B.) performance art C.) fine art D.) visual
d1i1m1o1n [39]

Answer:

a

Explanation:

6 0
3 years ago
Six security issues and six descriptions are shown below.
Trava [24]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question contains six securities terms and definitions.

The goal of this question is to properly map the term to its correct description/definition.

You can find the complete mapping in the attached image.

7 0
2 years ago
What percent<br> of students in<br> the US are<br> considered<br> ESL<br> students?
mariarad [96]

Answer: 9.5%

Explanation: There were nearly 5 million English language learners in U.S. public schools in fall 2015, according to the most recent available data from the National Center for Education Statistics. This represented 9.5% of U.S. public school enrollees, an increase from 8.1% in 2000

5 0
2 years ago
You configured the IP address and DNS name of a new internal web server named WEB3. Your first test from a web browser on your w
bonufazy [111]

Answer:

I would reset the Domain Name System (DNS)

Explanation:

One factor that could lead to the "Site Cannot Be Reached" error is DNS "poisoning". Another is invalid DNS cache. Both can be caused by an attack on the system by people trying to spoof the system. Spoofing ensures that even when the right address is entered, it leads one to another web address.

One way to quickly reset the DNS is to run ipconfig /flushdns

This helps to clear the DNS cache.

Once the DNS cache has been successfully flushed, the system returns a confirmatory message that reads “flushed the DNS resolver cache”.

The systems administrator can now proceed to reconfigure the IP address(es)

Cheers

3 0
2 years ago
O A self-confident person knows that:
arlik [135]
C you should believe in yourself and your abilities
3 0
3 years ago
Other questions:
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • How can you differentiate between standard and protocol? Write at least on example of each of these terminologies?
    12·1 answer
  • _____ view focuses on the text and content of a document, without much information on the page layout
    15·1 answer
  • Explain the saying "Dress for the position you want, not the position you have."
    6·2 answers
  • What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
    15·2 answers
  • Why are online payment services necessary?
    10·2 answers
  • 21
    13·1 answer
  • 1. Discuss the pros and cons of human-computer interaction technology?
    6·1 answer
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical example
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!