1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
2 years ago
11

Relationship between application system.and database​

Computers and Technology
1 answer:
RideAnS [48]2 years ago
3 0

Explanation:

there is a very close relationship between DBMS and application programs the application programs provide the user-interface to send request to DBSM and to receive processed results from DBMS processes that request and return the results to the application program and also controls and manages the database

You might be interested in
How much time does a gold chest take to open
MaRussiya [10]

Gold chest takes 8 hours to open or unlock.

<u>Explanation:</u>

Clash royale is a game which has been developed and published with the help of a super cell. It is a video game. Many players can play this game at the same time. In the sense, clash royale is a multi player game.

In this game, the players who are playing the game are awarded with the gold chest. They are also awarded with the gems. In order to unlock or open a gold chest eight hours are needed. Apart from this there is an other way also with which the gold chest can be unlocked. It can be unlocked with the help of forty eight gems.

7 0
3 years ago
Which of the following best describes a proxy firewall? A. It sends traffic through another host. B. It acts as a gateway for re
12345 [234]
The answer would be B, for your computer is considered a client instead of server.
6 0
3 years ago
when a driver receives a text while driving, what can 2022 versa’s hands-free text messaging assistant do?
Lena [83]

Answer:

It can translate text to voice

Explanation:

7 0
2 years ago
Does the wireless signal between the cell phones require matter to travel from one phone to another?
mrs_skeptik [129]

Mobile phones transmit and receive signals using electromagnetic waves, that is, wireless signal are electromagnetic waves which can travel through a vacuum, they do not need a medium or matter.

<h3>What are electromagnetic waves?</h3>

They are generated by electrical and magnetic particles moving at the same time (oscillating).

<h3>Characteristics of electromagnetic waves</h3>

  • Network waves are electromagnetic waves.

  • A mobile phone has coverage when it receives electromagnetic waves from at least one base station.

  • They do not necessarily require a material medium for their propagation.

Therefore, we can conclude that electromagnetic waves are those that do not need a material medium to propagate and include, among others, radio, television and telephone waves.

Learn more about electromagnetic waves here: brainly.com/question/13803241

3 0
2 years ago
What does spyware do on your computer?
Morgarella [4.7K]
It's a malware, and it basically let's the person/hacker/culprit get information off your computer without the owner of the computer knowing that the person is doing it. It's often used to find keystrokes, passwords, online interaction, and other personal data.
5 0
2 years ago
Other questions:
  • Universal Containers recently rolled out a Lightning Knowledge implementation; however, users are finding unreliable and unrelat
    6·1 answer
  • The number of credits awarded for the CLEP exam is determined by__<br> Help pls!
    15·1 answer
  • Why is the answer A?
    6·1 answer
  • You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
    11·1 answer
  • Domain of (x+8)/(x(x+10))
    12·1 answer
  • Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
    12·1 answer
  • What’s some WiFi passwords for some big brands that I can connect to while traveling?
    7·1 answer
  • Interactive television with video-on-demand capabilities changes how people watch television and how consumers access the Intern
    8·1 answer
  • ساعدوني على الإجابة على هذه الأسئلة
    11·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!