1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
6

What are the different types database of end users? Discuss the main activi-ties of each

Computers and Technology
2 answers:
disa [49]3 years ago
8 0

Answer:

following types of databases available in the market −

Centralised database.

Distributed database.

Personal database.

End-user database.

Commercial database.

NoSQL database.

Operational database.

Relational database.

Cloud database.

Object-oriented database.

Graph database

saveliy_v [14]3 years ago
8 0

Answer:

<em>1. Casual End Users</em>

These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.

<em>2. Naive or parametric end users </em>

These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:

The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.

Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.

Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.

<em>3. Sophisticated end users</em>

These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.

<em>4. Standalone users </em>

These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.

You might be interested in
What help the ict in your life?and write own idea three or four sentence
My name is Ann [436]

Answer:

I am a software engineering student

computers have createed an impact in my life because through computers i work, I do research and many more

7 0
3 years ago
What is the best definition for a relationship?
velikii [3]

Answer:

special instance of a dataset

7 0
3 years ago
Write a console application that takes an integer input from the user and calculates the factorial of it. Note: factorial of Exa
Stells [14]

Answer:

The program in Python is as follows:

n = int(input("Integer: "))

product = 1

for i in range(1,n+1):

   product*=i

   if(i!=n):

       print(str(i)+" *",end =" ")

   else:

       print(i,end =" ")

print(" = ",product)

Explanation:

This prompts the user for integer input

n = int(input("Integer: "))

This initializes the product to 1

product = 1

This iterates through n

for i in range(1,n+1):

This multiplies each digit from 1 to n

   product*=i

This generates the output string

<em>    if(i!=n):</em>

<em>        print(str(i)+" *",end =" ")</em>

<em>    else:</em>

<em>        print(i,end =" ")</em>

This prints the calculated product (i.e. factorial)

print(" = ",product)

4 0
3 years ago
Write a program that reads a file name from the keyboard. The file contains integers, each on a separate line. The first line of
Sindrei [870]

Answer:

Explanation:

import java.util.Scanner;

import java.io.*;

public class ArrayProcessing

{

public static void main(String[] args) throws IOException

{

Scanner kb = new Scanner(System.in);

String fileName;

System.out.print("Enter input filename: ");

fileName = kb.nextLine();

File file = new File(fileName);

if(!file.exists())

{

System.out.println("There is no input file called : " + fileName);

return;

}

int[] numbers = inputData(file);

printArray(numbers);

}

public static int[] inputData(File file) throws IOException

{

Scanner inputFile = new Scanner(file);

int index = 1;

int size = inputFile.nextInt();

int[] values = new int[size];

while(inputFile.hasNextInt() && index < values.length)

{

values[index] = inputFile.nextInt();

index++;

}

inputFile.close();

return values;

}

public static void printArray(int[] array)

{

int count = 1;

for (int ndx = 1; ndx < array.length; ndx++)

{

System.out.printf("%5.f\n", array[ndx]);

count++;

}

if(count == 10)

System.out.println("");

}

}

4 0
4 years ago
Why is derek miller's social media post different than most?
fgiga [73]
In the scenario in which Derek Miller's social media post is different than most since Miller had his family and friends write a post after he died with the letter he wrote. Hope this is the answer and would be of help.
5 0
4 years ago
Other questions:
  • In procedural programming, where does the flow of control usually route from the main function?
    8·1 answer
  • A patient presents at an outpatient urgent care facility with an acute illness and is seen by a provider. A detailed history wit
    13·1 answer
  • In Microsoft word you can access the blank command from the mini toolbar
    7·1 answer
  • Password is an example of an authentication mechanisms that is based on " what an entity has".
    6·2 answers
  • Siapa mahapatih brainly.com atau yg disebut Brainly Amerika Serikat ?​
    5·1 answer
  • All who are interested in forex trading and bitcoin mining follow me for account management to all who are busy with work so i c
    14·1 answer
  • What is considered appropriate dress for men and women in the workplace? Select all that apply.
    6·2 answers
  • The photo shows a group of girls reacting to comments they have read about a classmate on a social media site.
    10·1 answer
  • Help brainleist giving exam
    15·1 answer
  • An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!