Answer:
following types of databases available in the market −
Centralised database.
Distributed database.
Personal database.
End-user database.
Commercial database.
NoSQL database.
Operational database.
Relational database.
Cloud database.
Object-oriented database.
Graph database
Answer:
1. Casual End Users
These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.
2. Naive or parametric end users
These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:
The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.
Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.
Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.
3. Sophisticated end users
These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.
4. Standalone users
These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.
Any computer expert to help me answer this question plz am giving brainliest
Answer:
(Shown below)
Explanation:
The email is written as:
boby(at)qengineers.org
The first part of the email adress is the name, which is Boby. (boby(at)qengineers.org)
The second part will always be the (at) sign. (boby(at)qengineers.org)
The third and last part is the company, or where the email is coming from. (boby(at)qengineers.org)
Hope this helps!
(Also please note I put (at) for the at symbol because brainly doesn't let me type it in)
which of the following is not related to text formatting?
Explanation:
Searching, hope that helps. its 100% correct, goodluck.
WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
Answer:
LinkedIn has a very smart algorithm, and it has a very strict policy against spammers. Back in 2014, it deleted millions of accounts that were causing spam on LinkedIn.
Spam occurs:
1. When you send bulk of connect requests in a short time
2. When you send irrelevant messages to prospects
3. When you Perform overactivity
4. When you use LinkedIn automation tools
5. When you send spammy and sales-y messages
All these actions cause spam on LinkedIn, and it immediately takes action against you by restricting your account temporarily or permanently.
This number is written in binary (base 2). Convert it to decimal (base 10).
10110110
Answer:
Binary 10110110
Decimal 182
Hexadecimal B6
Bits 8
Equation 128 + 32 + 16 + 4 + 2
Explanation:
https://www.binary-code.org/binary/8bit/10110110/
Have a bless day and send positive all over the world :D
How many bits would be needed to count all of the students in class today? There are 16 children in the class.
Answer:
There will be 23 beats per children
When we say that communication is relational, what does that mean?
a. Communication is key to greater satisfaction in relationships.
b. Communication involves a wide range of socially appropriate behaviors.
c. Communication is something that we do to others.
d. Communication arises out of our interactions with others.
Answer:
a
Explanation:
Without communication there's nothing we can do .
Relational interaction includes the processes of interaction in personal relationships like romantic relations, family ties, and friendships, and further discussion can be defined as follows:
It consists of negotiating processes by which the dyadic partners define who they are and they will collaborate. This relation perspective assumes that the pair is indeed the best unit for interpersonal communication observation.Therefore, the final answer is "Option a".
Learn more:
brainly.com/question/12062755
7. In order to check your following distance, use a fixed object and count seconds.
True
False
Answer:
False
Explanation:
It is true that distance can be checked by counting seconds from a fixed object
How to determine the true statement?The given highlights are:
Using a fixed objectCounting secondsWhen seconds from a fixed object (such as a pole) are counted, the quantity that is being measured is time.
The time recorded can be used along the average speed to determine the distance traveled.
Hence, the given statement is true
Read more about distance and time at
https://brainly.com/question/4931057
#SPJ2
What are the three benefits of incremental development, compared to the waterfall
model?
Answer:
The cost of accommodating changing customer requirements is reduced
What is an example of an Experience component within an enterprise platform?
Answer:
A
Explanation:
A system used for processing customer payments. A tool used to coordinate recruitment of new employees. A mobile app used by customers to place orders.
Question: 5
In 2014, what percentage of the world population has access to the Internet?
Less than 30%
Less than 50%
Over 50%
Over 80%
Please help
In 2014, less than 50% percentage of the world population has access to the Internet option (B) less than 50% is correct.
What is a computer?A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers. These apps give computers the capacity to carry out a broad range of tasks.
As we know,
Internet, a system design that allows different computer networks all over the world to communicate, has transformed communications and methods of commerce.
Thus, in 2014, less than 50% percentage of the world population has access to the Internet option (B) less than 50% is correct.
Learn more about computers here:
https://brainly.com/question/21080395
#SPJ2
Which computer are used by mobile employees such as meter readers.
Answer:
Handheld/Mobile Computers
Www requires a tool called a
Answer:
The World Wide Web (WWW) requires a tool (software) called a HTTP. The full form of HTTP is Hypertext Transfer Protocol.0. It is a type of internet communication software that is needed for the publication of the website or www
Explanation:
The output signal from an analogue sensor is sampled every 195 µs to convert it into a digital representation. What is the corresponding sampling rate expressed in kHz?
According to the Sampling Theorem, for this sampling rate value, what approximately could be the highest frequency present in the signal, in kHz, assuming the lowest frequency is very close to zero?
If each sample is now quantised into 512 levels, what will be the resulting bitrate in kbps?
Give your answer in scientific notation to 2 decimal places.
Hint: you need to determine the number of bits per sample that produces 512 quantisation levels.
Answer:
A sample rate is just reciprocal of the sample period. According to sampling theorem the highest frequency in single would be [tex]5.13/2=2.565 KHz.[/tex][tex]2^8=512[/tex] So you will need 8 bits to represent.[tex]8 bits \times5.128\times(10)^3[/tex]samples [tex]=41.026[/tex] bits per second.Explanation:
Sample period of 1 millisecond [tex]=1 kHz.[/tex]
Thus a sample period of [tex]0.195[/tex] milliseconds is
[tex]1/0.195=5.12820513 Hz[/tex]
To determine the sample after [tex]512[/tex] levels quantization, we need to find bits per sample that produces [tex]512[/tex] quantization levels.
Thus,
[tex]2^8=512[/tex]
So you will need 8 bits to represent.
8 bits [tex]\times5.128\times(10)^3[/tex] samples [tex]=41.026[/tex] bits per second.
Learn more about scientific notation, refer :
https://brainly.com/question/10401258
Attackers have taken over a site commonly used by an enterprise's leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations. Which type of malicious activity is this?
A rootkit is a malware-style terminology designed to infect an attacker's target PC and allow them to install many tools that use him for persistent wireless connectivity to the system.
It is an illegal computer program to enable continuous privileged access to a computer and hide its presence actively. In today's life, it often conceals their existence and actions from uses and other functionality of the system, especially spyware - for instance, trojans, worms, viruses.That's why the rootkit is employed since it is developed in this case to access Victin's system at an administrator level.
Learn more:
brainly.com/question/3624293
give ways in which fire can be prevented in a computer lab
Answer:
don't try to run a sketchy game that plays in 4k on a computer and monitor that can only generate 1280p.
Explanation:
yes. I made that mistake once.
What is your impression on the subject fundamentals of database systems?
Answer:
The DBMS software enables users to share data. It provides a systematic method of creating, updating, retrieving and storing information in a database. DBMSs also are generally responsible for data integrity, data access control, and automated rollback, restart and recovery
Database Fundamentals introduces database concepts, including relational databases, tables and data types, data selection and manipulation, views, stored procedures, functions, normalization, constraints, indexes, security, and backup and restore.
Memory Uninstalling a program
A) Removes the program from memory
B) Removes the program from a disk
C) Removes the program from the monitor
D) Permanently removes a program that is no longer
wanted
Answer:
D
Explanation:
but you can re install it
jjhb ft fv tuning Denise l Debbie
Answer: is Debbi
Explanation: and what