1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
2 years ago
10

What are the main types of database end users,? Discuss the main activi-ties of each

Computers and Technology
1 answer:
soldi70 [24.7K]2 years ago
6 0

Answer:

Categories of End Users in DBMS

Casual End Users – These are the users who occasionally access the database but they require different information each time. ...

Naive or parametric end users – These are the users who basically make up a sizeable portion of database end users. ...

Sophisticated end users – ...

Standalone users –

You might be interested in
56- What is the term used when you press and hold the left mouse key and more the mouse
elena55 [62]

Answer:

i'd say it's dragging, but i'm not 100% sure

Explanation:

8 0
2 years ago
Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu
Bond [772]

Answer:

user_string = input("Input a string : ")

output = user_string.isnumeric()

if output == True:

   print("yes")

else:

   print("no")

Explanation:

  • First of all check whether user input have all numeric value or not .
  • Display yes if string contain all numeric values .
  • Display no if string contain at least one non - integer character .

7 0
3 years ago
Read 2 more answers
What changes should be made in OSI model(Open System Interconnection).
saveliy_v [14]

Answer:

Explanation:

When most non-technical people hear the term “seven layers”, they either think of the popular Super Bowl bean dip or they mistakenly think about the seven layers of Hell, courtesy of Dante’s Inferno (there are nine). For IT professionals, the seven layers refer to the Open Systems Interconnection (OSI) model, a conceptual framework that describes the functions of a networking or telecommunication system.

The model uses layers to help give a visual description of what is going on with a particular networking system. This can help network managers narrow down problems (Is it a physical issue or something with the application?), as well as computer programmers (when developing an application, which other layers does it need to work with?). Tech vendors selling new products will often refer to the OSI model to help customers understand which layer their products work with or whether it works “across the stack”.

Layer 7 - Application

To further our bean dip analogy, the Application Layer is the one at the top--it’s what most users see. In the OSI model, this is the layer that is the “closest to the end user”. It receives information directly from users and displays incoming data it to the user. Oddly enough, applications themselves do not reside at the application layer. Instead the layer facilitates communication through lower layers in order to establish connections with applications at the other end. Web browsers (Google Chrome, Firefox, Safari, etc.) TelNet, and FTP, are examples of communications  that rely  on Layer 7.

Layer 6 - Presentation

The Presentation Layer represents the area that is independent of data representation at the application layer. In general, it represents the preparation or translation of application format to network format, or from network formatting to application format. In other words, the layer “presents” data for the application or the network. A good example of this is encryption and decryption of data for secure transmission - this happens at Layer 6.

4 0
2 years ago
Read 2 more answers
When typing in a cell, hitting Tab will bring which result?
alexandr402 [8]

it's B I took the test :)

8 0
2 years ago
Read 2 more answers
Select the correct answer.
Marina86 [1]
C: pie chart is the answer to it
4 0
2 years ago
Read 2 more answers
Other questions:
  • Candace opened an email from a person she didn't know and clicked on a pop-up in the email that installed a virus on her compute
    8·2 answers
  • What is one course of action available in every problem solving process?
    9·2 answers
  • When designing your navigation, your primary objective should be to include keywords for search engines.
    6·1 answer
  • Sequential codes may be used to represent complex items or events involving two or more pieces of related data.
    7·1 answer
  • Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers
    13·1 answer
  • What type of formula uses data from multiple worksheets
    6·1 answer
  • Which of the following is the best description of an ip address?
    8·1 answer
  • The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addres
    14·1 answer
  • Which statement correctly describes the difference between an IP address and a MAC address for a
    14·1 answer
  • Scientist Galileo Galilei used the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!