How are data organized and manipulated in a database?

Answers

Answer 1

Answer:

What is Data Manipulation? Data manipulation refers to the process of adjusting data to make it organised and easier to read. These commands tell the database where to select data from and what to do with it.

Explanation:


Related Questions

How to change notification sounds for different apps.

Answers

Use linux; Linux allows for more customization than other operating systems and is free and open source.

Digital censorship is _____. Select 3 options.

used to free people

used to control people

subtle and often hidden

open and visible

a global problem

Answers

Digital censorship can be used by government or private individual to control people.

What is Digital censorship?

Digital censorship can be described as the controlling or suppression of the access to information on the Internet.

It can be carried out by governments or by private organizations and serves as a means of regulations.

Learn more about Digital censorship at;

https://brainly.com/question/26152499

Answer:

- used to control people

- subtle and often hidden

- a global problem

Explanation:

Digital censorship is the act of filtering out information and hiding it from the masses. This can be used in order to control and manipulate the public. It's a global problem that is very subtly accomplished. (correct on Edge)

I hope this helped!

Good luck <3

what is the impact of ict on school policy

Answers

Answer:

It improves the effectiveness of education. It aids literacy movements. It enhances scope of education by facilitating mobile learning and inclusive education. It facilitates research and scholarly communication.

Explanation:

Answer:

Hello FluffyStrawberry here~

Your answer is

It improves the effectiveness of education. It aids literacy movements. It enhances scope of education by facilitating mobile learning and inclusive education. It facilitates research and scholarly communication
hope it’s helps you

Explanation:

~FluffyStawberry

Dose brainly give you notifications on you're phone when you go into the site

Answers

Answer:

Yep it does ^_^

The way in which information travels on the internet, not as a single piece but in chunks.

Answers

If this is a true or false question then it’s true.

If your asking for what those chunks are then packets. I’m a packet addict.

Sonya wants to add a hyperlink to her new e-mail message. Her computer screen is shown.


Which tab should Sonya click in order to find the Hyperlink option?

Insert
File
Options
Review

Answers

Sonya should click insert because that is where the hyperlink button is.
Answer insert

Which method of funding higher education accrues interest until it is paid back?
A. Scholarships
B. Grants
C. Work-study programs
D. Loans

Answers

Answer:

D. Loans

Explanation:

You are performing digital forensics in an enterprise that recently experienced a security breach. You successfully retrieved all volatile data, and your next focus is hard drives. How should you collect evidence from the hard drives without tainting any evidence

Answers

How should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.

What is mirror image backups?

Mirror image backups can be defined as a type of backup that enables you to backup all the document or items that you have on your computer hard drive.

Mirror image backup is vital because it enables you to have the same copy  of all the data or information that is store on your hard drive.

Therefore how should you collect evidence from the hard drives without tainting any evidence is to: Use mirror image backup.

Learn more about Mirror image backups here:https://brainly.com/question/21465714

Packet analysis can also help _____ understand protocol and application behavior to see how routines behave, as well as help determine if it is the application OR the network that is causing slow response times.

Answers

Packet analysis can also help developers to understand protocol and application behavior to see how routines behave.

What is the Packet analysis  about?

Packet analysis  is known to be a tool that can help a lot of developers to be able to have a lot gains from understanding protocol and application behavior to see how routines behave.

Conclusively,  Packet analysis can be used to know or determine  when an  application or a given network is having or leading to slow response times.

Learn more about packet analysis from

https://brainly.com/question/6962155

#SPJ1



Differentiate between
Operating system and
language translator

Answers

It is a program or a series of programs which provides communication between the user and the computer hardware. Translators are programs which convert instructions in assembly language or high level languages into machine languages because computer can only understand machine language.

Kendra and her friends are working on a class project. The team is trying to make sure everyone in the group has the most up-to-date information as a project progresses. What is the best way for the Tina share their work?

a. Each person needs to send email with his/her part of the project individually every day

b. Each person should be on a cloud folder and sync their files as they are working through their project

c. Each person needs to send a group email to the team as soon as any updates are completed

d. Each person should post their updated information on a team website so it is available for anyone to see

Answers

The best way for Tina's team to share their work is: B. Each person should be on a cloud folder and sync their files as they are working through their project.

What is cloud computing?

Cloud computing refers to a type of computing that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives.

In this scenario, the best way for Tina's team to share their work, so as to make sure everyone in the group has the most up-to-date information as a project progresses is the use of cloud computing, where each person is on a cloud folder and will sync their files as they are working through their project.

Read more on cloud computing here: https://brainly.com/question/19057393

Complete the sentence.

When sensitive information is sent over the internet, it should be
.

Answers

Answer:

encrypted

Explanation:

to prevent others from viewing it

Answer:

Your answer is encrypted

Explanation:

This will keep your information secure whilst sending it.

This means to:

convert (information or data) into a cipher or code, especially to prevent unauthorized access

So your info is safe

Pls mark brainliest <3

Hope this helps :)

`

`

`

Tori

Which tab can help start a query? Create External Data File Home

Answers

The Create, External Data, File and Home tabs are in Microsoft Office Access

The Create tab can help to start a query

How to determine the tab?

There are several tabs in Microsoft Office Access.

Of all these tabs, the Create tab is used to help the user to start a query and return the required data of the query.

The other tabs such as file and home are used to perfom other tasks which include open files, save query, etc.

Read more about database at:

https://brainly.com/question/518894

Answer:

Its A Your Welcome

Explanation:

Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 KB, 4 KB, 20 KB, 18 KB, 7 KB, 9 KB, 12 KB, and 15 KB. Which hole is taken for successive segment request of

Answers

Answer:

um uwu

Explanation:

Attacks that exhaust all possible password combinations in order to break into an account are called _____ attacks.

Answers

Answer:

Brute force

Explanation:

Brute force means forcing your way into logging into an account.

This is done by trying all kinds of passwords, starting from something like "123456" to your birthday and getting increasingly complex passwords in the hope that the account has a weak password

One way to check if a website is secure is to look for a/an
in the address bar.

Answers

Answer:

One such sign to look for is in the URL of the website. A secure website's URL should begin with “https” rather than “http”. The “s” at the end of “http” stands for secure and is using an SSL (Secure Sockets Layer) connection. Your information will be encrypted before being sent to a server.

T - True. One way to check if a website is secure is to look for a padlock icon in the address bar.

How does this work?

This padlock indicates that the website is using a secure HTTPS connection. HTTPS encrypts the data transmitted between the user's browser and the website, ensuring that sensitive information such as login credentials or financial details remains private and protected from unauthorized access.

Additionally, a secure website's address will start with "https://" instead of "http://". Users should always verify these security indicators before entering any personal or sensitive information on a website to safeguard their online privacy and security.

Read more about websites here:

https://brainly.com/question/28431103

#SPJ2

Time machine could not create a local snapshot to back up from

Answers

Answer:

Time machine could not create a local snapshot to back up from Disk Error.

define a touch-sensitive pad and state one use​

Answers

Answer:

A touch pad is a device for pointing (controlling input positioning) on a computer display screen. It is an alternative to the mouse. Originally incorporated in laptop computers, touch pads are also being made for use with desktop computers. A touch pad works by sensing the user's finger movement and downward pressure.

Explanation:

You are pricing out a new laptop for a user. You decided to go with a traditional hard disk that has a cache of flash memory. Which type of disk are you purchasing

Answers

Answer:

A hybrid drive

Explanation:

Its called a hybrid drive because it combines two different kinds of storage, SSD and HDD. SSD is a solid state drive and it has no moving parts. It is much faster than a HDD and is more reliable but these benefits come at a trade off of a higher price per gigabyte. HDD is a hard disk drive and works by reading a spinning disk to get information. This kind of disk is usually used because of its low price/gb. This makes it an excellent option for getting lots of storage at a cheap price. A hybrid drive combines the best of both worlds by using a small SSD as a boot drive to start up a computer because it is much faster, and uses an HDD as the main storage drive with lots of space.

By buying in bulk, Deborah managed to have 6,000 CDs manufactured for $9,000. What was the cost per unit for manufacturing?

Answers

Answer: It would be $1.50 per unit

Explanation

In a typical information security program, what is the primary responsibility of information (data) owner

Answers

The typical responsibility of the information that an owner is to determine the level of sensitivity or classification level.

What is an information security program?

The information security program is a set of activities, projects, and initiatives that help an organization IT framework and help the organization meet all the business goals leading to corresponding to the benchmarks. The main duty of the data owner is to determine the level of sensitivity of the data.

Find out more information about information security.

brainly.com/question/25226643

Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.

Answers

The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

What is power point presentation?

Power point presentation is a softwere which display the data with the help of collection of slides.

Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.

Form the main view to access her presentation, Isabela need to follow the following steps-

Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.

Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

Learn more about the power point presentation here;

https://brainly.com/question/24653274

Answer: It’s B, Click the File tab, and click the open option

Explanation:

just got it right on edge

You use trace precedents for a cell containing a formula. What indicates an error in the precedents used?.

Answers

When you use Trace Precedents for a cell containing a formula, an error in the precedents used would be indicated by a red tracer arrow.

What is Trace Precedents?

Trace Precedents can be defined as cells or groups of cells in Microsoft Excel that is used to review and determine which ones affect the value of an active cell.

IGenerally, when you use Trace Precedents for a cell in a spreadsheet document containing a formula, an error in the precedents used would be indicated by a red tracer arrow, which is displayed between the dependent and precedent cells.

Read more on cells here: brainly.com/question/26053797

which includes code written
A computer programmer will often use a
by other programmers.
A. copyright
B. library
C. license
D. website

Answers

Hello!
Answer: B. Library.

I hope this helps you!

Which three steps might be included in an algorithm for a digital thermostat?
✓ A. The thermostat uses the resistance detected to calculate the
temperature.
B. The thermostat sends an electrical signal to either the air
conditioner or the heater.
C. The thermostat measures electrical resistance with its thermistor.
O D. The thermostat automatically installs itself by wiring itself to the
house's electrical system.

Answers

Answer:

Explanation:

It certainly isn't D. It would cost a fortune to make that happen. It's not impossibe. Just impractical.

It's not A. Resistance is a floating physical thing present in the air.

B could be correct, but there is a better answer.

The answer is C. A thermistor is a resistance that is temperature sensitive.

This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average

Answers

Answer:

d average

Explanation:

The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.

What is average?

Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.

The average is given as

[tex]\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}[/tex]

This is an example of the average formula.

More about the average link is given below.

https://brainly.com/question/521501

How would a user ensure that they do not exceed the mailbox quota?


The user can select a mailbox that does not have a quota.

The user can flag the items as Junk Mail.

The user can just move items to the Deleted Items folder.

The user must empty items from the Deleted Items folder or Archive items.

Answers

Answer:

I don't know about this one

Please help me on this it’s due now

Answers

I would say the answer is Logistics Manager, Material Handlers, and Inventory Managers.

Definition:

            Logistics Manager: person in charge of overseeing the purchasing

                                            and distribution of products in a supply chain

            Material Handlers: responsible for storing, moving, and handling

                                            hazardous or non-hazardous materials

            Inventory Managers: oversee the inventory levels of businesses

Hope that helps!

which of the following phase change when heat is removed form the material
A. sublimation
B. vaporization
C. Melting
D. Freezing​

Answers

Answer:

It will be D.Freezing

Explanation:

If heat is removed from a substance, such as in freezing and condensation, then the process is exothermic. In this instance, heat is decreasing the speed of the molecules causing them move slower (examples: liquid to solid; gas to liquid). These changes release heat to the surroundings.

GOOD LUCK

Edhesive Assignment 8: Personal Organizer.

I keep getting a bad input message on my line 52. Any tips on how to fix this?
I've included photos of my code.

Answers

In this exercise we have to use the knowledge in computational language in python to write the following code:

What is input?

Python's input function takes a single parameter which is a string. This string is often called a prompt because it contains informational text that tells the user to type something. For example, you can call the input function as follows:

So in an easier way we have that the code is:

eventName = []

eventMonth = []

eventDay = []

eventYear = []

def addEvent():

userEventName = input("What is the event: ")

userEventMonth = int(input("What is the month (number): "))

userEventDay = int(input("What is the date: "))

userEventYear = int(input("What is the year: "))

userEventMonth = validateMonth(userEventMonth)

userEventDay = validateDay(userEventMonth, userEventDay, userEventYear)

eventName.append(userEventName)

eventMonth.append(userEventMonth)

eventDay.append(userEventDay)

eventYear.append(userEventYear)

def validateMonth(month):

if month >= 1 and month <= 12:

return month

else:

return 1

def validateDay(month,day,year):

if day < 1 or day > 31:

return 1

if month == 2:

isleap = False

if year%4 == 0:

if year%100 == 0:

if year%400 == 0:

isleap = True

else:

isleap = True

if isleap:

if day <30:

return day

else:

return 1

else:

if day < 29:

return day

else:

return 1

if month in [1,3,5,7,8,10,12]:

return day

if month in [4,6,9,11] and day < 31:

return day

else:

return 1

def printEvents():

print("EVENTS")

months = ['January', 'February', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December']

for index in range(len(eventName)):

print(eventName[index])

print("Date: "+months[eventMonth[index] -1]+ " " + str(eventDay[index]) + ", " + str(eventYear[index]))

userChoice = "yes"

while userChoice.upper() != "NO":

addEvent()

userChoice = input("Do you want to enter another event? NO to stop: ")

printEvents()

See more about python at brainly.com/question/18502436

Other Questions
The different physical features that make up the ocean floor are Find the value of x.4476to Gathering testimonials when preparing for a sales presentation can be helpful in overcoming customer If K is the midpoint of ER, EK = z+5,and ER=4x+2,What is the length of K R? The volume of the right circular cylinder is 144 pi cubic yards. of h, the height of the cylinder is 4 yards, what is r, the radius of the base? Ver en espaolIn her free time, Isabelle likes to read. She kept track of the number of pages in each book she read last summer. This box plot shows the results.Book pages100150200250300350What fraction of the books had 200 or fewer pages? What is the difference between magnitude of displacement and magnitude of velocity Perform the followingmathematical operation, andreport the answer to thecorrect number of significantfigures.45.2 x 0.035 = How have conceptions of Native Americans evolved from those held in early America? The concluding paragraph of a narrative text often reflects on the events of the plot.eases the tensions of the plot.builds suspense in the plot.provides a turning point in the plot. People who might need to retrieve part or all of their investment relatively soon, such as the elderly, are often advised to invest a higher percentage of their money in bonds, and thus a lower percentage in stocks, than people who can leave the investment untouched for decades. We know, however, that bonds typically have a lower rate of return than stocks.Why would people be advised to invest in assets that give lower average rates of return?a. This is bad advice. People should always invest in whichever assets have the highest average rate of return.b. Although stocks have a higher rate of return in the long run, they are much more volatile, or riskier, in the short run. Therefore, there is a higher probability that the value of the stocks will be less than the original value of the investment for people who might need to withdraw the investment in the short run.c. Since bondholders get paid before stockholders in the event of bankruptcy of a firm, the average "real" rate of return on stocks and bonds will be the same, with bonds being less risky.d. Although stocks have higher average rates of return in the long run, bonds have higher average rates of return in the short run. Therefore, bonds are likely to be more profitable for people who might need to get their investment back in the short run. Simplify.Rewrite the expression in the form a.(a)? = 1Please needhelp urgently Who wants to be drawn :D I'll draw you What are the properties of copper. Find the measure of each exterior angle of the polygon. using the letter of the answer doesnt help because its different on each test Most teachers prefer using ___________ tools and materials in teaching.a.photogenicb.feignc.reclusived.disposition Besides Hungarian nationalism, the Habsburg Empire was also troubled byA. Pan-SlavismB. the Ottoman EmpireC. PolandD. Slavery what are excise duties? 33 markers cost $5.79 Which equation would help determine the cost of 13 markers