1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
12

Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential

for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide citations from the literature.
Computers and Technology
1 answer:
liraira [26]3 years ago
5 0
I have no clue what you are talking about I am so sorry
You might be interested in
The Government Information Security Reform Act (Security Reform Act) of 2000 focuses on management and evaluation of the securit
krok68 [10]

Answer:

True

Explanation:

In the above scenario about the Government Information Security Reform Act of 2000 is that concentrates on maintaining and evaluating an unidentified and homeland security programs. In other words, It concentrates on the Rights Division for the peoples of the nation by maintaining and protecting the security for the systems of their homelands.

3 0
4 years ago
Is it possible to connect a piano using a micro usb instead of a midi cord?
ValentinkaMS [17]

Answer:

MIDI might be a better option.

Explanation:

USB is much faster, and just as reliable as a MIDI cable. An external disk drive with a USB connection transmits data thousands of times faster than a single MIDI instrument with no problems! If you want to use very long cables, for on-stage work for example, MIDI might be a better option.

8 0
3 years ago
What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
Temka [501]
Your IP address, also known as Internet Protocol
7 0
4 years ago
Vkbfnkynbvkbj how do i unblocked websites on my school laptop?
aleksandrvk [35]

Answer:

impossible

Explanation: sorry but too bad

3 0
3 years ago
chaussure is an online shoe retailer. The applications for the web site are developed using classes and object-oriented programm
sesenic [268]

Answer:

the answer is  option E ....................a and c

i.e  credit card receipt &   Place Order button in an application

Explanation:

Reason is because the Text box, credit card receipt and button would be classes and text box to enter credit card number would also be an object of Text box class place order button would be an object of button class.

7 0
3 years ago
Other questions:
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • Your Windows PC has an AMD processor installed that includes AMD-V technology and the motherboard fully supports this processor.
    7·2 answers
  • Can Anybody Answer This
    8·1 answer
  • Risk is the product of what variables?<br><br> Threat<br><br> Value of asset<br><br> Vulnerability
    11·1 answer
  • Henry must choose which type of smart speaker to use in his home. He asked you to help him decide which one will best suit his n
    8·1 answer
  • A programmer needs to understand sequencing to determine whether the order of steps will affects the outcome of the program.
    11·1 answer
  • Write a html5 code to display 5 friends both an orderd and unordered list .
    12·1 answer
  • is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions
    7·1 answer
  • For what reason can security risks never be fully eliminated?​
    7·1 answer
  • Selling emojis that you dont have
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!