1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
12

Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,

end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. 1.2.
What four main types of actions involve databases?
Computers and Technology
1 answer:
wolverine [178]3 years ago
4 0

Answer:

data - Any form of value in a column of a table in a relational database.

DBMS - Short for Database management system, which is a software that can be used to create, manipulate and view databases, e.g. MS SQL Server.

database system - Same as DBMS.

database catalog - Place where the metadata of a Database, its tables, users etc. exists e.g. date created, size, number of columns etc. Also known as Data Dictionary.

program-data independence - Program-data independence refers to the capability of leaving data intact and accessible regardless of modifications to the database that contains the data.

DBA - Short for Database Administrator, person responsible for maintaining the database. Its main responsibility is to keep the data clean and safe i.e. data doesn't contain wrong or invalid data, and is safe from viruses and is backed up.

end user - Anyone who is not directly interacting with a database, but through some software like website and mobile application.

persisten object - An object of a class in a program, that interacts with the underlying database and is responsible for manipulating the database connected to.

transaction-processing system - A transaction process system is part of a software, responsible for making sure critical business transactions, like crediting or debiting money, either goes through cleanly or doesn't at all.

CRUD are the four main types of operations one can do in a database environment. It stands for creating, reading, deleting and updating.

Explanation:

You might be interested in
You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels s
AnnyKZ [126]

Answer: 1, 6, 11

Explanation:

To avoid communication issues based on the space of the environment the channels that should be configured should be done within an interval of 5. So it should be taken as 1, then the next 6 and finally 11. These helps to avoid communication issues.

6 0
3 years ago
What does the Auto Fill tool do?
ki77a [65]
I believe this a microsoft tool it <span>It automatically populates data into cells that reference other cells :)

hope this helps</span>
7 0
4 years ago
Read 2 more answers
All of the following statements correctly describe an advantage or disadvantage associated with the use of Monte Carlo Analysis
Ahat [919]

Answer:

The correct answer is letter "D": Monte Carlo simulations do not consider risks.

Explanation:

The Monte Carlo analysis is a risk management study that allows identifying different outcomes and possibilities of carrying out a project. It is useful at the moment of determining the project costs and the estimated time it will take to complete the plan. Besides, the Monte Carlo analysis uses quantitative data to compute its calculations which ensures to provide more accurate information and minimizes ambiguity in project schedules and costs.

5 0
4 years ago
When enabling IPsec mobile client support, you made some selections in the Xauth section of the interface. What does Xauth stand
konstantin123 [22]

Answer:

Extended authentication

Explanation:

Xauth = Extended authentication

An extended authentication can cause security to be increased because it requires the user to enter a username and password. These details would then be authenticated at the internal database of the controller. This extension is an ipsec extension which would enable VPN users to enter a username and password. These details would be required of the user while trying to connect and they would be checked against the login details registered by such a user.

4 0
4 years ago
Running fewer applications at once is a way to resolve which type of bottleneck?
vichka [17]
The answer is <span>memory.  </span>Running fewer applications at once is a way to resolve the bottleneck in <span>memory.  </span>Run fewer programs at the same time and restarting a PC regularly, is a good way to clear out its memory.
6 0
3 years ago
Other questions:
  • Most Answers MOST ANSWERS
    11·2 answers
  • Yolanda is writing a document that will provide configuration information regarding the minimum level of security that every sys
    5·1 answer
  • The Analysis phase of the SDLC examines the event or plan that initiates the process and specifies the objectives, constraints,
    10·1 answer
  • Assume that a text box named PhoneNumberTextBox appears on a form and contains the phone number 414-555-5555. What value will di
    5·1 answer
  • It is advised to always have discretion with leaders. Explain in general terms what information security policies can and cannot
    12·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • HELP PLEASE What is an internal part of a computer which contains all software programs installed on your computer?
    9·2 answers
  • 9.18 LAB: Exact change - methods Write a program with total change amount as an integer input that outputs the change using the
    11·1 answer
  • What is the output?
    11·2 answers
  • The way that a writer displays their personality and imagination on the page is called:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!