<span>Make eye contact look at everyone ur speaking to not just one person speak loud and clearly make sure your understandable</span>
Answer:
The program to this question can be given as:
Program:
public class Main //define class.
{
public static void main(String[] as) //define main method.
{
int n=5; //define variable n and assign positive value.
int i,j; //define variable
for (i = 7; i>=1; i--) //outer loop.
{
for (j = 0; j< i; j++) //inner loop.
{
System.out.print("*"); //print asterisks.
}
System.out.println(); //line break.
}
}
}
Output:
*****
****
***
**
*
Explanation:
The description of the above code can be given as:
- In the above java programming code firstly we define a class that is "Main". In this class we define a main method in the main method we define a variables that is "n" in this variable we assign a positive value. The we define another integer variable that is i,j this variable is used in the loop.
- Then we define a loop. for prints asterisks values in reverse triangle, we nested looping concept. In nested looping, we use in loop in this loop we use the i and j variables that print the asterisks value.
Answer:
<u>Authorization</u> component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.
Explanation:
Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.
No they are images that are free to use as long as your not using them to make profit and you give credit to the person who owns the image.
Oracle, DB2, and Microsoft SQL Server are examples of RDBMS. Therefore, the <u>correct option of this question is (c)</u> i.e. RDBMS.
A software used to store, query, and retrieve data stored in a relational database is referred to as a relational database management system (RDBMS). In RDBMS, data is represented in tables with rows and columns.
The RDBMS handles administrative functions such as managing data access, storage and performance. To perform these administrative services, RDBMS provides an interface between the database, applications and users.
Some features of RDBMS are described below:
- RDBMSs are more secure, faster and easier to work with.
- More than one user can have access to RDBMS at a point of time.
- RDBMS supports distributed databases.
- RDBMS can store a vast amount of data.
- Only the data in the form of tables is managed by RDBMS.
- Data redundancy is reduced in RDBMS using primary keys and indexes.
Thus, Oracle, DB2, and Microsoft sql server are example of RDBMS.
<u>While the other ptions (a) supply chain management and (b) erp applications are not correct because:</u>
- Supply chain management is a centralized management process that handles the flow of goods and services, such as movement and storage of raw materials, inventory, finished goods, and delivery of the final product.
- Enterprise resource planning (ERP) applications refers to software used in organizations to manage day-to-day business operations such as project management, risk management and compliance, procurement, accounting and supply chain operations.
You can learn more about relational databases at
brainly.com/question/13262352
#SPJ4