Answer:
1. DBMS
C. <em>A storage system that provides efficient access to randomly chosen items</em>
G. <em>Performs database operations requested by application software</em>
2. data mining
B. <em>The process of extracting hidden information</em>
3. hash file
A. <em>A. means of locating a particular record within a file</em>
4. index key field
F. <em>An item used to identify records uniquely</em>
5. locking protocol
E. <em>A system to guard against database errors due to performing transactions concurrently</em>
6. relation
D. <em>A structural unit (with rows and columns) in a popular database model</em>
7. roll back schema
I. <em>A "road map" of a particular database's design</em>
J. <em>To "unwind" a transaction</em>
8. SQL
H. <em>A popular language that implements relational database operations.</em>
Microscope
bc thats the answer
It help to melt the snow quicker. they salt eats away the snow.
Answer:
# Code in Python
dictionary={'A':1,'B':2,'C':3,'D':4}
other_dictionary={}
for keys in dictionary:
if dictionary[keys]&1==1:
temp=dictionary[keys]*dictionary[keys]-10*10
other_dictionary[keys]=temp
else:
other_dictionary[keys]=dictionary[keys]
print(other_dictionary)
assert other_dictionary
Explanation:
- Initialize a sample example dictionary and other_dictionary.
- Do a binary comparision for checking odd number
.
- Update the the value stored in the dictionary to store the squared difference of the original value and '10'.
- For even: store the original value (from dictionary).
Answer:
b. white-hat hacker
Explanation:
A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.
These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information