1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
10

What are the main types of database end users,? Discuss the main activi-ties of each

Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
6 0

Answer:

Categories of End Users in DBMS

Casual End Users – These are the users who occasionally access the database but they require different information each time. ...

Naive or parametric end users – These are the users who basically make up a sizeable portion of database end users. ...

Sophisticated end users – ...

Standalone users –

You might be interested in
You listened to a song on your computer. Did you use hardware or software? Explain.
omeli [17]
Software, unless you planned on permanently downloading the Music Album or Song to your computer's Hard Drive. i.e, you would use whatever Music or Media player you have installed on your computer, and that simply counts as Software. 
 hope this helps.
6 0
3 years ago
Read 2 more answers
Explain the reason why vector graphics are highly recommended for logo​
Verdich [7]

Answer:

Currently, raster (bitmap files) and vector graphics are used in web design. But if you want to make a great logo and fully enjoy the use of it you should pick vector graphics for it in the first place. And this is why most designers opt for it.

Explanation:

  • Easier to re-edit
  • No image distortion
  • It is perfect for detailed images
  • Vector drawings are scalable
  • Vector graphics look better in print
7 0
3 years ago
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
Lady_Fox [76]

Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

<h3>What are the three main causes of security breaches?</h3>

The major reasons for data breaches are:

  • Old, Unpatched Security Vulnerabilities.
  • Human Error
  • Malware, etc.

Therefore, Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

Learn more about Cybersecurity from

brainly.com/question/12010892

#SPJ1

5 0
2 years ago
Factor completely: 4y^2 - y - 3
notsponge [240]

Answer:

(4y + 3)(y - 1)

Explanation:

4 {y}^{2}  - y  - 3

4 {y}^{2}  - 4y + 3y - 3

4y(y  - 1) + 3(y - 1)

(4y + 3)(y - 1)

7 0
2 years ago
Read 2 more answers
How do you know when a spreadsheet object is active in a Word document?      A. The Ribbon is minimized. B. The Excel Formula ba
MaRussiya [10]
Y<span>ou will know when a spreadsheet object is active in a Word document </span>t<span>he Word icon in the taskbar is selected. The ribbon of Word will provide you with the Microsoft Excel features to be used for editing. These include charts, conditional formatting, and formulas.</span>
3 0
3 years ago
Read 2 more answers
Other questions:
  • What Is the output of the following: =OR (5 &lt;7, 16*Rand ()&gt;23,FALSE)
    5·1 answer
  • A design tool helps you plan, evaluate, and explain your ideas to create a product. Some examples of design tools are outlines,
    10·2 answers
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • Which device can be installed on the edge of your network to allow multiple remote users to connect securely to your internal en
    9·1 answer
  • Imagine that the following two lines of code are placed inside a
    11·1 answer
  • Consider the following code segment. int[] seq = {3, 1, 8, 4, 2, 5}; for (int k = 1; k &lt; seq.length; k++) { if (seq[k] &gt;=
    5·1 answer
  • When working on developing an ability, it is important to get feedback to know how you are doing.
    6·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • Suppression of politically or socially unacceptable co
    5·1 answer
  • 1- pensamiento sistémico<br>2- visión oriental y occidental​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!