1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
12

Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential

for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide citations from the literature.
Computers and Technology
1 answer:
liraira [26]3 years ago
5 0
I have no clue what you are talking about I am so sorry
You might be interested in
Files and e-mail messages sent over the Internet are broken down into smaller pieces called _____.
Fynjy0 [20]
Files and email messages sent over the internet are broken down into smaller pieces called packets
6 0
3 years ago
Unlike when writing in a programming language, there are no set rules that must be followed when writing pseudocode. What do you
Elan Coil [88]

Answer:

Explanation:

Pseudocode may not have a set number of rules of guidelines but there are still some habits that should be followed. This includes having only one statement per line and add the END keyword to loops. Both of these rules/habits will drastically increase the readability of the pseudocode and allow you to know exactly where a certain loop starts and ends. Since loops can become difficult to read if they have a lot of code within them. Another good guideline to keep in mind is to simplify the code as much as possible do not add unnecessary pseudocode if it is not absolutely needed.

7 0
3 years ago
Many everyday objects (such as amusement park rides, cars, elevators, and ovens) that you might not normally associate with a co
lisabon 2012 [21]

Answer:

Major risks include computer security and maintability of the software and hardware components of the computers in these objects.

I may feel more scared if I was riding a roller coaster that was computer controlled because if there were vunerabilities in the computer's software, a hacker could exploit that and remotely have access to the controls of the roller coaster, putting many people's lives at risk.

I think the benefits of computerizing an increasing number of everyday objects outweigh the potential risks.

This is because computers is very reliable and they do exactly what you tell them to do. However, humans are clumsy and can sometimes be extremely stubborn. Computerizing more everyday objects is an overall good thing for society, however, policies and protocols need to be followed to ensure these computerized objects remain secure.

Explanation:

Hope this helps.

4 0
3 years ago
If Mary makes homemade jams that she sells to her local grocer, she is practicing:
DIA [1.3K]

Answer: c) C2B (Consumer to business)

Explanation: Consumer to business (C2B) is the business technique in which the consumer or customer generates the good or service and then businesses are offered to take that product or service. The case mentioned in the question is also similar where May sells the jams made by her to the local grocer who has his business.

Other options are incorrect because Business to business (B2B) is where two business party trade with each other, Business to consumer (B2C) is business offer the product or service to consumer and Costumer to costumer(C2C) is the private trading of service between two individual parties. Thus,the correct option is option(c).

8 0
3 years ago
Which strategy would most likely improve a student's reading comprehension?
Fynjy0 [20]

Answer:

I think asking questions is the best.

Explanation:

I believe asking questions are the best because you get to understand the text which is really good. Some 7th grade reading teachers can help you a lot and you can use iLit to help a bunch.

8 0
3 years ago
Read 2 more answers
Other questions:
  • 38. Which of the following best describes why e-mail spoofing is easily executed? a. SMTP lacks an adequate authentication mecha
    15·1 answer
  • Which part of the os provides users and applications with an interface to manipulate files?
    8·1 answer
  • If you reset your iPhone will it delete everything including your Apple ID information
    9·2 answers
  • How and why do engineers use models?
    15·1 answer
  • Which of the following statements about software licensing are true? Select 3 options.
    5·1 answer
  • Hardware refers to programs and protocols used on a computer system.<br><br> True<br> False
    8·2 answers
  • The Matlab Script should:1. Clear the command window2. Clear the workspaceQuestion 1: Why do we clear the command window and wor
    9·1 answer
  • Anybody got a quisten
    12·1 answer
  • Who knows my sister better?
    15·2 answers
  • Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!