1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stels [109]
3 years ago
14

III. FILL-IN THE BLANK (five points each)

Computers and Technology
1 answer:
Tasya [4]3 years ago
4 0

Answer:

Explanation:

13

You might be interested in
Which component of the technological system is achieved when an automobiles airbag inflates
Aleonysh [2.5K]
Process is the component achieved.

8 0
3 years ago
What is jcl language on the mainframe?
Pavel [41]
Job Control Language on the mainframe is the name for scripting language used on IBM mainframe operating system to instruct how to start a subsystem.
5 0
3 years ago
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. manipulation
Ira Lisetskai [31]

Answer:

definition

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Hence, the data definition component of a database management system (DBMS) is used to create and maintain the data dictionary.

6 0
3 years ago
When data can flow across a cable in both directions, this is known as___Communicating?
Ede4ka [16]

Answer:

full duplex communication.

Explanation:

In a duplex type of topology or communication, data or information can be transferred in both directions.

There are two different types of these communications

3 0
3 years ago
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
Other questions:
  • What are the desirable qualities of a Product Vision?
    11·1 answer
  • What is the difference between the new and open commands on the file menu
    12·1 answer
  • Brooke is trying to save enough money in the next fifteen months to purchase a plane ticket to Australia. Every month Brooke sav
    9·1 answer
  • Which of the following statements about arrays are true?
    10·1 answer
  • In the ADT graph the methid addVertex has efficiency
    15·1 answer
  • A newly opened law firm in Kirkland decides to create a small website that provides a brief introduction of the firm, its missio
    8·1 answer
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    6·1 answer
  • A user brings a technician a mobile device that has no sound. What should a technician check for first?
    5·1 answer
  • What does “modulate your voice” mean?
    9·1 answer
  • Parameters and return make
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!