Discuss the main characteristics of the database approach and how it differs from traditional file systems.

Answers

Answer 1

The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.

The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.


Related Questions

Students who respond promptly to e-mails are following which netiquette rule?

A. keeping content appropriate
B. assessing an online environment
C. respecting everyone’s time
D. practicing ethical behaviors

Answers

Answer:

respecting everyone's time

Explanation:

they don't make people wait for a response

Its Option C - Respecting Everyone’s Time.
Thank you!

Proper numeric keyboarding technique includes all of these techniques except
O keeping your wrist straight
O resting your fingers gently on the home keys
O looking at the keys
O pressing the keys squarely in the center

Answers

The answer is looking at the keys

Answer: Its the 1st choice, 2nd choice, and the final one is the 4th one. (NOT the third answer choice)

Explanation: (I just took the test)... Hopefully this helps and good luck.

if you exit a program without saving the document on which you are working, or the computer accidentally losses electrical power, the document will be lost

Answers

Depends on which program you are using. Some programs automatically save your work, even if you exit out of it or turn off your computer

What makes Java platform independent?

Answers

Answer:

Java it is the use of Byte code that makes it platform independent.

Explanation:

Java platform independent language allows its the end users to access they source code and other language automatically,its a human readable language.

Java is created in the James Gosling at the sun micro systems,and java is an open source programming language, generally the people refer the java because its source connections.Java code may be use sequence of machine that can be use executed by the directly CPU,and all the program in java are compiled by java c.Java is an independent platform and variety of methods, its object oriented language, and java is study platform.Java program are compiled into byte code and that byte code is platform independent, and they machine execute the byte code the java virtual machine.Java is the platform independent because it does not depend on the type of platform,and the virtual machine also interpret the representations.Java compiler is the .class file or the byte code and the machine native code,java is that depend on java virtual machine.Java is does not required any licence to the run and they also reliable platform to work on.

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Something else? Discuss this question and provide support for your answer.

Answers

Answer:

The single greatest physical threat to information systems is:

Sabotage

Explanation:

Sabotage describes the efforts of internal persons to ensure that a system does not operate as intended or is destroyed.  Among the threats to information systems, this is the greatest.  The problem with sabotage is that the operators are internal, they know the system very well.  They understand the weak points and the strengths of the system.  They are internal terrorists to any information system.  These internal saboteurs are capable of using any means to achieve their purpose.  Therefore, it is necessary to scrutinize employees from time to time to discover internal risks.

Write a MATLAB function named average_of_scores_with_drops The function will have two inputs and two return values. The first input will be a list of scores. The second input will be a postive integer representing the number of scores to drop. It will not be larger than the length of the list. Your function should determine the average of the scores after dropping the specified number of lowest scores. The first return value must be a real number equal to the average score. The second return value must be the number of items that were averaged. Notes: Example Test Case: SCORES

Answers

Answer:

-%Define the function.

function [avg, ele_left] = average_of_scores_with_drops(input_list, drop_element)

%Sort the list.

input_list = sort(input_list);

%Compute the length of the list.

len_list = length(input_list);

%Declare and initialize the variable.

sum = 0;

%Increase the element to be drop by 1.

i = drop_element + 1;

%begin the for loop.

for k = i : length(input_list)

%Add the elements.

sum = sum + input_list(k);

%End of the for loop.  

end

%Compute the elements left after dropping the dropped element.

ele_left = length(input_list) - drop_element;

%Compute the average of the elements left.

avg = sum/ele_left;

%End of the function defined.

end

%Run the following code in the command prompt.

%Call the function and return the average

%score and the number of elements

%whose average is computed.

[average_score , number_of_items] = average_of_scores_with_drops([8 6 1 2 3 5 10], 2)

SAMPLE OF OUTPUT

average_score = 6.40000000000000

number_of_items = 5

What will be the result from running the following program? print grades print 92 print 80print total print 92+80

Answers

Answer:

Grades

92

80

Total

92 + 80

Explanation:

When utilizing quotations, you enable to code to print what wrote, as it is. So, instead of adding the 92 + 80, it's printed out.

I hope this helped!

Good luck <3

What device to use when downloading a large file?

Answers

Pc is a device to downloading load file

How has technology influenced space exploration?

Answers

Answer:

One of the biggest benefits of machine learning when it comes to space exploration is that programs can sift through the available data more easily than humans, which increases the chance of finding planets just by looking at datasets. It's even thought that AI could be instrumental in locating extra-terrestrial life.

Explanation:

Question #1
What do you use to navigate through a file by moving the view
up and down or side to side?
O Title bar
O Ribbon
O Document area
O Scroll bar


Answers

d scroll bar be cause it’s a file which means computer

Answer:

Answer is the Scroll Bar

Explanation:

When you are in a document, the way you move around or navigate in it is by dragging the scroll bar that is to the left of your screen or at the bottom of your screen.  Hope this helps!

When does the VB.NET programming environment start to operate?
A. once a VB.NET project is compiled
B. once a VB.NET project is created in the Microsoft Visual Studio environment
C. once a VB.NET project is debugged
D. once a VB.NET project folder is opened
E. All of the above are correct

Answers

Answer:

B. once a VB.NET project is created in the Microsoft Visual Studio environment.

Explanation:

Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.

How many pins are in the power supply connector that is typically used on most motherboards today?

Answers

Answer: 4 pins

Explanation:

Answer: 20+4 ATX pins.

Explanation: If you’re talking about supplying power from the PSU to the Motherboard then it would be the 20+4 pin connector. Back on old ATX motherboards it used to be the 20 pin connector.

When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of your computer becoming infected?
A. Printing to the same printer as infected computer
B. Accepting email attachments sent from an infected computer
C. Sharing Word documents with an infected computer
D. Sharing removable disks with an infected computer

Answers

Answer:

d

Explanation:

The correct option is D: Sharing removable disks with an infected computer

Removable disks are disks that use to keep data as well transfer data or information from one computer to another computer.

With Removable disks a computer infected with a virus cannot infect another Computer as the what the user does is to simply insert  the USB port of the  Removable disks into the computer which inturn enable the transfer of data to the computer to take place .

Learn more about Removable disks here:

https://brainly.com/question/4327670

Recursion is a natural use for a _____ (stack or queue)

Answers

Answer:

Stack

Explanation:

Any function that call itself can be regarded as recursive function, it should be noted that Recursion is a natural use for a stack, especially in the area of book keeping.

Recursion is very important because some of problems are usually recursive in nature such as Graph and others, and when dealing with recursion , only base and recursive case is needed to be defined.

Some areas where recursion is used are in sorting and searching.

How many bits are reserved for the Transmission Control Protocol (TCP) flags?

Answers

It’s 6 bits are reserved for the 6 TCP control flags. A connection, at which layer, implies that every segment of data sent is acknowledged? transport; A connection at the transport layer implies that every segment of data sent is acknowledged.

Which of the following is used to encrypt web application data?
a. MD5
b. AES
c. SHA
d. DHA

Answers

Answer:

b. AES

Explanation:

AES is an acronym for Advanced Encryption Standard and it is a cryptographic or symmetric block cipher that is based on a substitution-permutation network (SPN) used for the encryption of sensitive data over the internet or web. AES uses a key length of 128, 192 or 256 bits and a block length of 128 bits to encrypt data on web applications.

It is an encryption standard of the government of the United States of America and is supported by the National Institute of Standards and Technology (NIST).

Hence, AES is used to encrypt web application data and it uses an algorithm developed by Vincent Rijmen and Joan Daemen, known as the Rijndael algorithm.

5. Which one of the following best defines a network server?
O A A type of network system that provides resources to network clients
B A type of system where all devices on the network are clients
C A type of network with one server and multiple clients
O D A type of device that connects all all other network devices together

Answers

Answer:

i thank it is B for the answer

An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?

Answers

Answer:

Redundant networks are generally more reliable.

Explanation:

The complete question is in this brainly link;

https://brainly.com/question/18302186

This is based on knowing the importance of a redundant network.

C. Redundant networks are more reliable

A redundant network is one that helps to increase the reliability of a computer system.

Now, this is possible because the more critical the ISP NETWORK is, the more important it will be for the time it takes to resolve from a fault would be reduced.

This implies that, by adding one redundant device to their connection, the time it will take to resolve from a fault would be drastically reduced and this will lead to a far more reliable system.

Thus, redundant networks are more reliable.

Read more at; brainly.com/question/17878589

What benefits does the Domain Name System (DNS) provide? Check all that apply.
Network Address Translation (NAT)
Ease of address memorization
Assigning Internet Protocol (IP) addresses
Easy mapping to a new Internet Protocol (IP) address

Answers

Answer:

Option C (Assigning Internet Protocol (IP) addresses) is the correct choice.

Explanation:

DNS is a centralized process for resolving as well as continuing to give IP addresses for something like a specified domain name, a method that allows you to search a site via your web browsers whenever you tab or switch on any web server (Internet Explorer, chrome, respectively.).This helps everyone to still have throughput mostly on the network although one of the databases becomes offline for maintenance.

All other options are not relevant to the situation in question. It is the right answer to all of the above.

Answer:the TCP

Explanation:

Clicking and double-clicking are two of the five

Answers

Answer:

The correct answer is events

Which example of IT lifelong learning is most likely to lead to a promotion

Answers

Answer:

A supervisor learns about personal finance.

Hope the above answer helps u...

If my answer helped u mark me as brainlist..!

Follow me...

Answer:

A supervisor learns about personal finance.

Explanation:

One of the simplest and best known polyalphabetic ciphers is _________ cipher. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.

Answers

Answer:

Vigenere

Explanation:

Vigenere Cipher is an encryption method of alphabetic symbols that utilizes an easy form of polyalphabetic exchange which is carried out through Vigenere table.

Hence, in this situation, the correct answer is VIGENERE Cipher because it is the form of cipher whereby the set of related monoalphabetic substitution rules comprises of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is indicated by a key letter which is the ciphertext letter that substitutes for the plaintext letter.

C++ code pls write the code

Answers

Answer:

Following are the code to this question:

#include<iostream>//defining header file

using namespace std;

class vec//defining class vec  

{

int x, y, z; //defining integer varaible x, y, z

public: // using public access specifier

vec() //defining default constructor

{

   x = 0; //assign value 0 in x variable  

   y = 0; //assign value 0 in y variable

   z = 0;//assign value 0 in z variable

}

vec(int a, int b , int c) //defining parameterized constructor vec

{

   x = a; //assign value a in x variable

   y = b; //assign value b in y variable

   z = c;//assign value c in z variable

}

void printVec() //defining a method printVec

{

   cout<<x<<","<<y<<","<<z<<endl; //use print method to print integer variable value

}

//code

vec& operator=(const vec& ob) //defining operator method that create object "ob" in parameter  

{

x=ob.x; //use ob to hold x variable value

y=ob.y;//use ob to hold y variable value

z=ob.z;//use ob to hold z variable value

return *this;//using this keyword to return value  

}

};

int main()//defining main method

{

vec v(1,2,3);//calling parameterized constructor

vec v2; //creating class object to call method

v2=v; //creatring reference of object

v2.printVec(); //call method printVec

return 0;

}

Output:

1, 2, 3

Explanation:

In the above-given code part, a method "operator" is defined, that accepts an object or we can say that it is a reference of the class "ob", which is a constant type. Inside the method, the object is used to store the integer variable value in its variable and use the return keyword with this point keyword to return its value.    

Which of these browsers was the first widely adopted?
1. Internet Explorer
2. Chrome
3. Firefox
4. Netscape

Answers

Answer:

netscape

Explanation:

The question is in the picture

Answers

Answer:

nordthaf

Explanation:

nofth

For what purpose are high-level programming languages used for

1. Give control over the hardware to execute tasks quickly

2. Provide code that controls the computers hardware

3. Translate low-level programming languages into machine code

4. Write programs for general applications

Answers

Answer:

To speed up the compiler during run time

Explanation:

Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, search for, and process information? MP3 player. Hard drive. Flash drive. Personal computer.

Answers

Hard drive is your answer

Answer:

It's personal computer

Explanation:

I got it right on my assignment

What is the outside of an iPhone called?

Answers

What, what are you talking about

Sam card tray is the answer

Write a program that prompts the user to input an integer that represents the money in cents. The program will the calculate the smallest combination of coins that the user has. For example, 42 cents is 1 quarter, 1 dime, 1 nickel, and 2 pennies. Similarly, 49 cents is 1 quarter, 2 dimes, and 4 pennies

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cent: "))

quarter = int(cents/25)

if quarter > 1:

     print(str(quarter)+" quarters")

elif quarter == 1:

     print(str(quarter)+" quarter")

cents = cents - quarter * 25

dime = int(cents/10)

if dime>1:

     print(str(dime)+" dimes")

elif dime == 1:

     print(str(dime)+" dime")

cents = cents - dime * 10

nickel = int(cents/5)

if nickel > 1:

     print(str(nickel)+" nickels")

elif nickel == 1:

     print(str(nickel)+" nickel")

penny = cents - nickel * 5

if penny > 1:

     print(str(penny)+" pennies")

elif penny == 1:

     print(str(penny)+" penny")

Explanation:

This line prompts user for input in cents

cents = int(input("Cent: "))

This line calculates the number of quarters in the input amount

quarter = int(cents/25)

This following if statement prints the calculated quarters

if quarter > 1:

     print(str(quarter)+" quarters")

elif quarter == 1:

     print(str(quarter)+" quarter")

cents = cents - quarter * 25

This line calculates the number of dime in the input amount

dime = int(cents/10)

This following if statement prints the calculated dime

if dime>1:

     print(str(dime)+" dimes")

elif dime == 1:

     print(str(dime)+" dime")

cents = cents - dime * 10

This line calculates the number of nickels in the input amount

nickel = int(cents/5)

This following if statement prints the calculated nickels

if nickel > 1:

     print(str(nickel)+" nickels")

elif nickel == 1:

     print(str(nickel)+" nickel")

This line calculates the number of pennies in the input amount

penny = cents - nickel * 5

This following if statement prints the calculated pennies

if penny > 1:

     print(str(penny)+" pennies")

elif penny == 1:

     print(str(penny)+" penny")

$8.25/hour; _____$/year, when working 40 hours a week.

Answers

if you work 50 weeks/year and 40 hours/week, you will make 16,500 dollars per year if you make 8.25 per hour
Other Questions
Translate into Algebra.Jen had D dollars. She bought a video. Now she has R dollars. How much did she pay for the video? 3. Which statement summarizes the social contract described by John Locke and Jean-Jacques Rousseau? Solve for x: 3x7=7x+13 I am like most Americans and vote on individual issues. I try to stay open minded and my attitude on an issue can change based on learning something new. Like, when I saw that movie "Vegucation" and became a Vegan. 13. Adding up all of theof all of the individual atoms within one molecule of a compound will determine the molecular mass of the compound.A. atomic numbersB. electronsC. atomic massesD. protons 6. Identify which of the following factors creates a movement of the entire demand curve andwhich creates movement along the demand curve.a. Consumer income-b. PriceC. Consumer taste-d. Number of consumers-(Need a definition for each one on how they work on a demand curve) I need to know the time for the clock in spanish How can mindfulness help people make better choices? Which accurately compares a benefit of Jamestowns environment with a disadvantage? The marshy ground was good for growing tobacco, but it attracted mosquitoes that caused malaria. The rocky ground was a sign of large gold deposits, but the rocks in the soil broke all the plows. The old-growth forests were rich in timber, but putting out forest fires was a major problem. The island location made it good for trade, but the riverbank was too far to reach with a bridge. 23Fill in the blank with the Spanish word that best completes the following sentenceLas personas tienen doso pelospiernascuellosnarices Which of the following is a way to exhibit professionalism?a. certificationsb. teamworkc. technologyd. speech What's one similarity between the British-Native American relations described in the petition and French-Native American relations? Which of the following is not a leader in the First Triumvirate of Rome The way characters react to one another affects the _____ of a story.point of view conflictsettingsequence The settlement at Roanoke Island is known as the Lost Colony. True False A patient has discussed her concern over the large quantity of amalgam fillings in her mouth; she fears that the mercury may be affecting her health. She has scheduled an appointment to discuss this with the dentist. How would you expect the dentist to respond to this patient? Reread lines 88-100. What transformation has taken place? What assumptions had you made about the characters that had to be changed? Support your answer with explicit textual evidence and commentary (reflection). Why does volcanic rock not contain many fossils Yesterday, between noon and midnight, the temperature decreased by 27.2F. If the temperature was -8.6F at midnight, what was it at noon? * how are the ideas of Thomas hobbes and John locke similar and different?