1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
2 years ago
6

How to code for a database?​

Computers and Technology
1 answer:
olganol [36]2 years ago
7 0

Answer: <em><u> How to code for a database?​ A database is an organized collection of data, generally stored and accessed electronically from a computer system. Where databases are more complex they are often developed using formal design and modeling techniques. </u></em>

WWW. Wikipedia.com

Explanation: When creating a database first you need to make a software program then you need to start planing on what to do ...

{ A database management program (DBMS) is a software package design designed to manipulate, define, retrieve, and manage data in database.

A DBMS generally manipulates the data itself, the the data format, field names, record structure and file structure.}

<h3><u><em>HoPe ThIs HeLpS YoU!!</em></u></h3>

<u><em /></u>

You might be interested in
Hardware consists of the physical devices associated with a computer system, where software is the set of instructions the hardw
Vikki [24]

Answer: a)True

Explanation:

  • Hardware is the component of computing system that contains physical devices and parts through which commands are given by user by touching or pressing the physical device.E.g- keyboard, mouse etc.
  • Software is the program set or series of instructions that is run in the form of command to get executed in computing system.It carries out to instruction to perform tasks.E.g-application of computer
  • Other option is incorrect as the statement is true.
  • Thus, the correct option is option(a).
6 0
3 years ago
What will be displayed in the console when this program runs?
Novay_Z [31]

Answer:

20 will be displayed on the console.

Explanation:

Given code is:

var numList = [10,20,30];

console.log(numList[numlist.length-2]);

The first line of code declares an array named numList and assigns it values given in the square brackets.

The second line of code is written to display the element on the index obtained by [numlist.length-2]

[numlist.length-2] means the second index.

Hence,

after running the code on JavaScript editor and dry running the code

20 will be displayed on the console.

7 0
2 years ago
Read 2 more answers
This device operates at layer 2 but functions at the higher layers.
Stels [109]
A multilayer switch maybe?? I hope it’s right

6 0
3 years ago
What is used to configure data sources for applications that require access to a database?
Radda [10]
A network is used to configure data sources for applications that require access to a database?
6 0
3 years ago
An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
Sedaia [141]

Answer:

Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.

Explanation:

The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.

And also, the use of high-performance computers makes these algorithms effective

7 0
3 years ago
Other questions:
  • Explique si en la pc que se usa para hacer las tareas escolares se puede ver un video juego de los llamados “pesados”
    13·1 answer
  • What does the do not disturb button do on the iphone?
    12·1 answer
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • Where in an email would u find information about the action requirements​
    9·1 answer
  • Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
    10·1 answer
  • Once the CPU has fetched the data requested, what are the next steps in the process?
    15·1 answer
  • Write a list comprehension that creates a list containing the numbers that result from the values 1 through 10 being multiplied
    15·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • it is good to know and use the npsd framework while solution envisioning as part of the value discovery cycle. What is NPSD?
    10·1 answer
  • What is bigger that terbites
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!