1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
10

What are the main types of database end users,? Discuss the main activi-ties of each

Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
6 0

Answer:

Categories of End Users in DBMS

Casual End Users – These are the users who occasionally access the database but they require different information each time. ...

Naive or parametric end users – These are the users who basically make up a sizeable portion of database end users. ...

Sophisticated end users – ...

Standalone users –

You might be interested in
Which layer of the OSI model defines how to start, control, and end conversations by grouping messages in a workflow
Valentin [98]

Answer:

The session layer defines how to start, control, and end conversations (called sessions). This includes the control and management of multiple bidirectional messages so that the application can be notified if only some of a series of messages are completed.

Explanation:

4 0
3 years ago
The purchase of a computer by a person for household use would be counted in what category of GDP?
Talja [164]

Answer: The purchase of a computer by a person for household use is counted as Consumption (C).

Explanation: Consumption (C) is the category of GDP that is spent by households on final goods and services in a given year but which excludes spending on new housing.

4 0
4 years ago
The power we use at home has a frequency of 60 HZ. What is the time period of such a power?
Digiron [165]

Answer:

The period of the power for our lights at home is 0.0116 s, or 16.6 ms.

6 0
4 years ago
"The graphics driver was recently updated on a system. Now, the graphical user interface (GUI) is not displaying, preventing the
pickupchik [31]

You can access a full-screen TTY session by holding down the Ctrl+Alt keys, and pressing one of the function keys. Ctrl+Alt+F3 will bring up the login prompt of tty3.  If you log in and issue the tty command, you'll see you are connected to /dev/tty3.

Explanation:

  • tty2 is short for teletype, but it's more popularly known as terminal.
  • It's basically a device (implemented in software nowadays) that allows you to interact with the system by passing on the data (you input) to the system, and displaying the output produced by the system
  • You can either : press ctrl+alt+F7  Or  run the command startx if the above commands do not work.
  • The tty command of terminal basically prints the file name of the terminal connected to standard input.
  • In Linux, there is a pseudo-teletype multiplexor which handles the connections from all of the terminal window pseudo-teletypes (PTS). The multiplexor is the master, and the PTS are the slaves.
  • The multiplexor is addressed by the kernel through the device file located at /dev/ptmx.
  • The -s (silent) option causes tty to generate no output.

8 0
3 years ago
What are the four main types of section breaks? Check all that apply.
Romashka-Z-Leto [24]
The answer would be next page, continuous, even page, and odd page.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Which is the term for a computer typically located in an area with limited security and loaded with software and data files that
    9·1 answer
  • Where does cable termination occur in most buildings?
    9·1 answer
  • Each processor or core processes two threads at the same time is called _________.
    5·1 answer
  • • Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?
    5·1 answer
  • Which symbol is used to identify edge-triggered flip-flops? a triangle on the clock input. the letter e on the enable input. a b
    14·1 answer
  • Read the sentence.
    10·1 answer
  • An exact-match query is:
    13·1 answer
  • In information security, a specification of a model to be followed during the design, selection, and initial and ongoing impleme
    5·1 answer
  • Which statement is true about hacking?
    11·2 answers
  • Please tell me which ones go into which categories no files!!
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!