1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
8

What Is database as used in computer science​

Computers and Technology
1 answer:
Natalija [7]3 years ago
8 0

Answer:

A database is an organized collection of structured information, or data, typically stored electronically in a computer system.

You might be interested in
The goal of _______ is to identify and fix as many errors as possible before units are combined into larger software units.
Archy [21]

The goal of <u>unit testing</u>  is to identify and fix as many errors as possible before units are combined into larger software units.

<h3>What are the types of integration testing?</h3>

Some different types of integration testing are big-bang, mixed (sandwich), risky-hardest, top-down, and bottom-up. Other Integration Patterns are: collaboration integration, backbone integration, layer integration, client-server integration, distributed services integration and high-frequency integration.

<h3>Which is integration testing?</h3>

Unit and System testing are various testing levels where the Unit testing is used to test each unit or an individual component of the software application. The integration testing is used only after the functional testing is completed on each module of the application.

To learn more about integration , refer

brainly.com/question/27015819

#SPJ4

6 0
1 year ago
How to make a negative number positive in excel
Viefleur [7K]

Answer:

DB * -1

Explanation:

Use this formula: DB * -1

DB = Desired Box

DB * -1

4 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Which situation best describes the prosumer effect?
elena-s [515]

C

Explanation:

https://www.sciencedirect.com/science/article/pii/S2405844019356750

8 0
4 years ago
Sharon has multiple tables in her database. she wants to view related records in those tables. what should sharon do to view the
den301095 [7]

according to plato she should create relationships between the tables

3 0
3 years ago
Other questions:
  • Assume that to_the_power_of is a function that expects two int parameters and returns the value of the first parameter raised to
    11·1 answer
  • Write a program having a concrete subclass that inherits three abstract methods from a superclass. Provide the following three i
    11·1 answer
  • What is a PowerPoint template?
    6·2 answers
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • When choosing a new computer to buy, you need to be aware of what operating it uses.
    12·1 answer
  • Which type of storage disk and disk drive can be used in the given situation? Amy wants to borrow an interesting movie from Bruc
    10·2 answers
  • Who can pick up GPS signals
    14·1 answer
  • Write a program that turns a 32-bit numeric value (e.g., 0xFFFFh) and converts it to a byte array such that it can be printed to
    10·1 answer
  • The compiler determines the parameterized type in a function template ___________.
    13·1 answer
  • Which term describes the distance from one point on a wave to the same point on the next wave?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!