Answer:
hypertext
Explanation:
Hypertext is used to describe a computer system that could store literary documents, link them
according to logical relationships, and allow readers to comment and annotate what they read.
Hypertext can also be said to be a system in which text on one page is used to link to text on other pages. They are simply text with links to other text.
Examples of hypertext footnotes, indexes, magazines, newspapers, etc.
A hypertext fiction can be described as an electronic literature with use of hypertext links.
Answer:
D) use SQL or graphical tools to query the database
Explanation:
To query the database using SQL or graphical tools will help Howie to retrieve bulk of records from the database according to his requirements and it will help to understand and work with the data in a better way than using the data in raw form.
SQL is a language of database used to manipulate and manage the data in the relational database and to query the database.
It is an easy and faster way to query using SQL or graphical tools because no coding is required here.
Different graphical tools are used to present the data in the database in a way that can be easily understood by a person. Different interfaces are provided to visualize the database tables or schema diagrammatically e.g in the form of graphs etc. Different views of the database can be provided to different users according to their requirement and what information they required to be presented.
Security/Insider threats.
As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.
Cyber-attacks.
Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.