1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastasy [175]
2 years ago
8

12. Your project specifications call for a business rule that the database design can't

Computers and Technology
1 answer:
fomenos2 years ago
8 0

A lot of business rules needs to be triggered so as to run.

In making of business rule, one can select triggers to run some specific events or run using some particular specified frequency.

The trigger options differs  based on the type of rule you are interested in.  One can also use multiple triggers when using a single rule.

Learn more about rules from.

brainly.com/question/5707732

You might be interested in
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
Mesh networks:__________.
postnew [5]

Answer:

b. typically contain more circuits in the network than in star or ring networks

Explanation:

In mesh architecture, all computers are connected to each other. In mesh all nodes connect directly and non hierarchical to each other so as  to efficiently route data.

Mesh combines the benefits of both ring and star networks. It  usually provide relatively short routes through the network (compared to ring networks) and provide  many possible routes through the network to prevent one circuit from becoming overloaded (as compared to star network).  Mesh network uses decentralized routing with each network performing its own routing.

Mesh network typically contain more circuits in the network than in star or ring networks and are more expensive than ring networks

7 0
3 years ago
Please name the OOP term that allows children classes to have methods with the same names as methods in their parents.
RSB [31]

Answer:

Inheritance

Explanation:

3 0
3 years ago
Create a scenario of a hypothetical company that needs an information system. This scenario should include the following informa
Effectus [21]

A  hypothetical company that needs an information system is Memphis drilling and construction company.

<h3>What is the size of a project?</h3>

This is known to be the  the number of firms taking part in the project and thus in the case above, it is small project.

In terms of Staff/experts availability, there are experts from the mining industry with years of experience, soil survey analyst as well as other minor staff.

In terms of System level of criticality, it is big because the extent to drilling will make use of the information system and other major decisions made.

Learn more about  information system from

brainly.com/question/14688347

#SPJ1

6 0
1 year ago
Computer is a versative Idiot, explain with respect to teaching and learning<br>​
Verizon [17]

Answer:

Computer is a versative Idiot, explain with respect to teaching and learning

Explanation:

Primary Logo

Introduction to Computer

Subject: Computer

Home Grade 9 Computer Introduction To Computer Introduction To Computer

Search for notes, Q&As, Videos, etc.

Syllabus

Introduction to Computer

Introduction to Computer

History of Computer

Applications of Computer

Electro Mechanical Computers

Generation of Computer

Computer Systems

Types of computer

Computer Hardware

Computer Software

Number System

Operating System

Information System and Social Impact of Computer

Information Technology Policy

Concept of E-Governance

Webpage Designing

Algorithm and Flowchart

Program and Programming Languages

QBASIC Programming

Overview

Computers are the machines that can perform tasks or calculations according to set of instructions or programs. This note introduces you with the computer.

Note

Things to remember

Videos

Exercise

Quiz

Introduction to Computer

Computers are the machines that can perform tasks or calculations according to set of instructions or programs. The term computer is derived from the word compute which means to calculate. Computer is an electronic device that can perform arithmetic and logical calculations faster. The first fully electronic computers, introduced in 1940s, were huge machines that required teams of people to operate. Compared to those early machines, today's computers are not only thousand times faster, they can fit on your desk, lap and even pocket. You must appreciate the impact of computer in our day-to-day life. The computer has been useful in reservation of tickets in Airlines and Railways, payment of telephone and electricity bills, deposits etc.

Advantages of computer

Computers are very fast due to which thousands of job can be performed within a short period of time.

Complex mathematical problems and logical operations can be solved by using this computer.

As computer is a versatile device, multiple task like communication, graphics, documentation can be done.

A huge amount of data can be stored and retrieved as it has high storage capacity.

Disadvantages of computer

Computers are machine hence, they have no brain so they work according to the program instructions set inside it.

It is an electronic device and it uses electrical sources to work, so it is very risky to store data and information on the computer independently because some electrical and electronic damages may damage the data. So we have to make regular backup of the data.

Since computers are very expensive device, it becomes beyond the capacity of general user. But now a day its price is going down than past.

Computers require dustless and temperature maintained environment for best performance

6 0
2 years ago
Other questions:
  • Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
    5·2 answers
  • The ____ preceding a formula alerts excel that you are entering a formula or function and not text
    14·1 answer
  • #include &lt;iostream&gt;
    9·1 answer
  • What are the factors affecting the purchasing decision for dbms software?
    7·2 answers
  • You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open
    5·1 answer
  • Im lonnnelllly........................who want to date
    11·1 answer
  • ¿Es aquel panel que controla la estructura de la tabla dinámica?
    14·2 answers
  • What can a user modify on a business card using the Edit Business Card dialog box? Check all that apply.
    6·1 answer
  • Verbs in the active and passive voice
    14·1 answer
  • Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends mon
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!