1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
3 years ago
9

You complete your database, and the company begins using it. Shortly afterwards, two GearUp buyers, Cora and Owen, work together

on a sale from a supplier called TennisSource. Both come to you complaining that their entry into the "Supplier History" part of the database is not showing up. Instead, the field reads "invalid entry." What is most likely the problem?
Computers and Technology
1 answer:
Olegator [25]3 years ago
3 0

Answer: Multi-user issue

Explanation: A database management system scheme can have multi-user issue when the designing of the system is not made properly. The multi user issue rises when the users concurrently access the data from the database and related error get invoked due to some reason like  repeatable reading issue, serialization, etc.

The reading problem is usually can be related to reading of the database in  uncommitted manner, uncommitted reading, repeatedly reading etc.Thus, Cora and Owen are accessing the database concurrently which can create multi-user issue.

You might be interested in
Convert 10101010 into decimal number system​
geniusboy [140]

Answer:

170 hope this helps you with

3 0
3 years ago
Read 2 more answers
What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
Pavel [41]
They leverage smart engineering from the best of the best people to make the company more humanly capable of extraordinary measures
4 0
2 years ago
Cual es la relacion existe entre TENGNOLOGIA y la PRODUCCION DE ENERGIA
andrezito [222]

Answer:

la tecnología tiene energía para hacer que los dispositivos funcionen, que es como los humanos y la energía. Los seres humanos usan energía, ¡la tecnología también usa energía!

Explanation:

ps. this is in english, my home language

technology has energy to make devices work, which is like humans and energy. human beings use energy, technology uses energy too!

5 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Which is not a MARKETING impact of technology?
Artist 52 [7]

Answer:

the answer is environmental

6 0
3 years ago
Other questions:
  • By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducti
    15·1 answer
  • What can help prevent issues related to downloading content from the internet
    11·2 answers
  • There are several different formats for storing images. They are prints, slides, negatives, and digital. Which is the best forma
    8·1 answer
  • Eugenia told her coach that she was too tired to play. As soon as she said it, she realized that she had made a big mistake. She
    12·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • Cheri's teacher told her to write a program that prompts the user for information. Which function should she use? input() int()
    14·1 answer
  • How do design elements and color work together on a web page?
    15·1 answer
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
  • Who invented different photo-capture methods in photography?
    7·1 answer
  • What is the decimal number 86 when written as a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!