1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
3 years ago
12

Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,

end user, canned transaction, deductive database system, persistent object, meta-data, and transaction-processing application. 1.2.
What four main types of actions involve databases?
Computers and Technology
1 answer:
wolverine [178]3 years ago
4 0

Answer:

data - Any form of value in a column of a table in a relational database.

DBMS - Short for Database management system, which is a software that can be used to create, manipulate and view databases, e.g. MS SQL Server.

database system - Same as DBMS.

database catalog - Place where the metadata of a Database, its tables, users etc. exists e.g. date created, size, number of columns etc. Also known as Data Dictionary.

program-data independence - Program-data independence refers to the capability of leaving data intact and accessible regardless of modifications to the database that contains the data.

DBA - Short for Database Administrator, person responsible for maintaining the database. Its main responsibility is to keep the data clean and safe i.e. data doesn't contain wrong or invalid data, and is safe from viruses and is backed up.

end user - Anyone who is not directly interacting with a database, but through some software like website and mobile application.

persisten object - An object of a class in a program, that interacts with the underlying database and is responsible for manipulating the database connected to.

transaction-processing system - A transaction process system is part of a software, responsible for making sure critical business transactions, like crediting or debiting money, either goes through cleanly or doesn't at all.

CRUD are the four main types of operations one can do in a database environment. It stands for creating, reading, deleting and updating.

Explanation:

You might be interested in
Leslie’s parents put a big dry-erase board on the refrigerator and let the kids write suggestions for how to organize and assign
blondinia [14]

Answer

determine possible solutions

Explanation:

im assuming

ty for the thanks

5 0
2 years ago
Which of the following statements is TRUE? A. A name error occurs if the variable is referenced before it is declared. B. A name
lisov135 [29]

Answer:

A is the correct answer.

8 0
2 years ago
What is the name of the function used to open a file in C?
Rudiy27

Answer:

prompt box

Explanation:

the term has changed over the years.

4 0
3 years ago
If you wanted to find out whether an integer contained an even number of 1 bits, which status flag would be useful
AleksandrR [38]

Answer:

The correct answer will be "Parity".

Explanation:

  • Parity seems to be a methodology that tests when information is transferred or missing or overwritten when something is transferred between one storage location to another, and then it is communicated between processors or devices.
  • It would be used whilst also contrasting the container as well as the aggregated parity to evaluate or dual inspect for inaccuracies.
8 0
3 years ago
A computer reads a sequence from top to bottom and left to right? True or False
Nat2105 [25]
The answer is False
5 0
3 years ago
Other questions:
  • What error, if any, is in the following code?
    11·1 answer
  • Network signaling is a function of which layer of the osi model
    10·1 answer
  • You work in the Accounting Department and have been using a network drive to post Excel workbook files to your file server as yo
    9·1 answer
  • A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
    14·1 answer
  • What is internet marketing??
    13·1 answer
  • R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication bet
    13·1 answer
  • Learning Task 3: Write the safety requirement indicated in each number on a
    15·1 answer
  • Discuss five processes for analyzing a qualitative study
    11·2 answers
  • The first person to say something in here will get brainliested.
    7·2 answers
  • When evaluating an AND operator, what is necessary for execution?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!