1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
3 years ago
6

Software that enables the organization to centralize data is called A. Data Repository B. Data Base Management System C. Data Wa

rehouse D. Data Mart E. Data File
Computers and Technology
1 answer:
balandron [24]3 years ago
4 0

Answer:

B. Data Base Management System

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Hence, a software that enables the organization to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data, is called a Data Base Management System (DBMS).

You might be interested in
The following code segment is a count-controlled loop going from 1 to 5. At each iteration, the loop counter is either printed o
quester [9]

Answer:

True.

Explanation:

For all the count values, if Ranfun() returns true then all the values of count would be printed. Then the sequence of count values printed would be 1 2 3 4 5. Also for all the values of count if Ranfun() returns false then all the values would be enqueued. When we try to dequeue elements from queue we would get them in the same order of their entry into the queue. Thus, the sequence would be 1 2 3 4 5. Hence, we can say that this output sequence is possible. TRUE.

4 0
3 years ago
Complete the following statements by choosing the correct answer from the drop-down menus.
LUCKY_DIMON [66]

Answer:

1) control panel

2) WYSIWYG HTML

3) website directory

4)website directory

Explanation:

In the website host’s <u>control panel</u>, there is a set of tools for organizing the website.

A <u>WYSIWYG HTML</u> editor lets the website creator type directly into the web pages or specific fields without knowing HTML code.

All website files need to reside in the  <u>website directory.</u>

The <u>website directory</u> is where all of the content will be stored.

<u>OAmalOHopeO</u>

7 0
3 years ago
Write a program 10 enter 3 number and find smallest.​
timama [110]

10 + 3 = 13

13 - 10 = 3

5 0
2 years ago
Please help!!!!<br> Data means only facts. <br> A. TRUE B. FALSE
vredina [299]
B false data does not only have to be facts
6 0
3 years ago
Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust serve
klio [65]

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

7 0
3 years ago
Other questions:
  • What is the only true way to wipe out every possibility of the virus?
    11·1 answer
  • has anyone noticed that brainly has been giving the wrong answers and that the ads are blocking answers or is that just me?
    7·2 answers
  • If a firm's pages are not near the top of query results, customers may never discover its website. This has led to _____ becomin
    12·1 answer
  • Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer
    5·1 answer
  • To display the entire entry for a calculated field, select the column in the Field row, right-click to display the shortcut menu
    15·1 answer
  • In which of the following work situations would word processing software be most appropriate to make the task easier?
    6·1 answer
  • Im having trouble with PLC subject. How to make this ladder diagram?
    15·1 answer
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • A system of classifying and organizing online content into categories by the use of user-generated metadata such as keywords is
    8·1 answer
  • 2. List the differences between personal
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!