1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olegator [25]
2 years ago
12

The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary.

Computers and Technology
1 answer:
erastova [34]2 years ago
4 0

Answer:

IDggK

Explanation:

You might be interested in
What is the difference between throughput and bandwidth?
masha68 [24]

Answer: Please find below the answer along with explanation.

Explanation:

For  a given communication channel (for instance, a LAN segment using Ethernet ) the Bandwidth refers to the theoretical maximum data rate that the channel can support, for instance, 100 Mbps in a 100Base T network.

The throughput, instead, refers to the actual data rate achieved in a given communications channel, taking into account the different channel impairments.

For instance, in a LAN segment that uses the original Ethernet 802.3 standard (CSMA/CD), a frequent occurrence of collisions can take down the actual data rate from the theoretical 100 Mbps to a very lower figure, i.e., 5 Mbps.

4 0
3 years ago
Identify tags and attributes in HTML 5
Vaselesa [24]

Answer:

Tags can be identified as they are written as <tagname> Something </tagname>

<tagname> this tag is called start tag.

</tagname> this tag is called as end tag.

for ex:<p> This is a paragraph </p>

There are some elements with no end tag.for ex:- <br> tag.

Attributes are used to provide additional information to an HTML element.

Every element can have attributes.

for Ex:- <h1 style="background-color:red";>MY WEBSITE </h1>

So the background of h1 will become red.

7 0
2 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
2 years ago
Ruben is helping his team choose a leader. Of the people Ruben is considering, which one has qualities most related to being an
siniylev [52]

An effective team leader shows great skills in every area, shows great support and respect to his teammates and is very easy to get along with.

5 0
3 years ago
Read 2 more answers
Which of the following allows a user to quickly access a frequently used computer app? Alphabetize program icons. O Create a sho
professor190 [17]

Answer:

Create a shortcut on the toolbar

Explanation:

You can use process of elimination. alphabetizing would not help to find it quicker, but it is an easier way. Deleting all icons wouldn't help at all. And placing all icons in a folder would make it even messier. So, it is creating a shortcut. Plus, I got it right on my test :)

7 0
3 years ago
Read 2 more answers
Other questions:
  • Triangle O N M is cut by line segment L K. Line segment L K goes from side N O to side N M. The length of N L is x, the length o
    8·2 answers
  • Bullets in a text box will do which of the following?
    9·1 answer
  • Which ergonomic principle helps to maintain good posture?
    7·2 answers
  • Helpppp plsssss!!!<br><br>thanks.
    7·1 answer
  • Cognitive psychology is the scientific study of what
    9·1 answer
  • What term is used to refer to the way companies collect and process data in order to create new information to make important bu
    13·1 answer
  • A technician configures a switch with these commands:SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.
    8·1 answer
  • Java code?????
    12·1 answer
  • What are Manuscript signs​
    8·1 answer
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!