The ____ design is the process of selecting the data storage and data access characteristics of the database.

Answers

Answer 1

Answer:

The Physical database design is the process of selecting the data storage and data access characteristics of the database.


Related Questions

Pedestrians, bicyclists, and skateboarders _____ the rules of right-of-way when they use the road.

Answers

Pedestrians, bicyclists, and skateboarders must follow the rules of right-of-way when they use the road.

What are the names of the methods which are used to control an i/o device??.

Answers

Answer: 1

Explanation:

i took the quiz and it was correct

does anyone know how to make a astronaut hop while using loop?

Answers

Answer:

In Java

Explanation:

package application;

import java.util.Scanner;

import entities.Astronaut;

public class Main {

public static void main(String[] args) {

 Scanner sc = new Scanner(System.in);

 

 System.out.print("How is the astronaut's energy in a scale of 0 to 100? ");

 int energy = sc.nextInt();

 

 Astronaut fakeArmstrong = new Astronaut();

 

 while (energy > 0) {

  fakeArmstrong.hop();

  energy--;

 }

 

 System.out.println("The astronaut is tired eh? Let him rest you psychopato");

 sc.close();

}

}

----------------------------------------------------------------------------------------------

package entities;

public class Astronaut {

private int bodyEnergy;

 

public Astronaut() {

 

}

 

 

public int getBodyEnergy() {

 return bodyEnergy;

}

public void hop() {  

 System.out.println("up and down!");    

}

}

Amelie is planning a gingerbread house making workshop for the neighborhood, and is writing a program to plan the supplies. She's buying enough supplies for 15 houses, with each house being made out of 5 graham crackers. Her favorite graham cracker brand has 20 crackers per box. Her initial code:

Answers

The line of code that successfully calculates and stores the number of leftover crackers in the final box is extras ← crackersPerBox - (neededCrackers MOD crackersPerBox).

From the complete information, her initial code is given as:

numHouses ← 15

crackersPerHouse ← 5

crackersPerBox ← 20

neededCrackers ← crackersPerHouse * numHouses

It was depicted that Amelie realizes that she'll need to buy more crackers since the crackers come in boxes of 20.  Therefore, to calculate how many graham crackers will be leftover in the final box, the line of code from the options will be extras ← crackersPerBox - (neededCrackers MOD crackersPerBox).

Read related link on:

https://brainly.com/question/25663035

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.

Answers

Answer:

Virtualisation

Explanation:

The correct answer would be virtualisation software, this is because it allows more computers to be "created" in the form of virtual machines. These virtual machines contain everything that a regular computer would have, i.e networks, storage devices, and processors except that it is virtual. You just need to have hyper v enabled in system settings.

Hope this helps!

Do you think should give credit to people who invented viral dances?

Answers

Answer:

michal jackson i think who credit to people invented viral dances.

Answer:

Yes

Explanation:

Well, they added some taste to life.

what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?

rules

feedback

tasks

algotithms

Answers

Answer:

A. Rules

Explanation:

Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player

5G can support more users simultaneously than LTE, but it may not provide any improvements in terms of data rates. True or False

Answers

It looks like it should be true because I learned it from my dad

Modems communicate data by using which method?.

Answers

Considering the modem technology, Modems communicate data by using Radio frequency method.

What is Radio frequency method?

The radio frequency method in modem communication allows modems to communicate or transfer data through wireless over a distance of tens of kilometers.

The essence of Radio frequency in modems

With radio frequency, modems can easily communicate without telecommunication or satellite network operators. It usually performs at 300 MHz to 900 MHz range.

Hence, in this case, it is concluded that the correct answer is the Radio frequency method.

Learn more about modem technology here: https://brainly.com/question/9617717

How many binary digits are in 10^100.

Answers

Answer:

333 binary digits.

Explanation:

The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage

Answers

The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.

System design involves the process of determining an overall system architecture, which typically comprises the following:

Hardware.End users.Physical processing components.Software.Communication channel.

Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:

1. Planning.

2. Analysis.

3. Design.

4. Development.

5. Testing.

6. Implementation.

7. Maintenance.

From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.

During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.

Read more: https://brainly.com/question/20813142

Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.

Answers

Jim is the main antagonist while Edward is the main protagonist of the movie.

Animals living in burrows under the ground is an interaction between the biosphere and the

Answers

Answer:

Geosphere

Explanation:

The geosphere is made up of the rocks and minerals of the earth found in the ground.

Chapter 20 reading and vocab review

Explain the subtractive and additive approaches to editing.

Answers

Answer:

Essentially additive editing and stringing “the good stuff” together, whereas subtractive is more about stringing all your raw footage together and “removing the bad stuff”

Additive editing feels confident and concerned with the pursuit of a specific, existing vision. And it’s faster. Subtractive editing feels like a deeper listening to what the footage is saying, and holding on to many potential permutations.

Explanation:

Addictive editing -  creating a program from raw footage by starting by starting with nothing and adding selected components

Subtraction editing  - creating a program by removing redundant or poor quality material from the original footage

Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do

Answers

Answer:

bobo

Explanation:

What are web protocols.

Answers

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

Who are the primary users of erp systems?.

Answers

Explanation:

resellers, partners, suppliers, and distributors.

poob bn vbyfcfgxfc jghjg jhgh

Answers

Answer:

Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.

Explanation:

five types of conflict in the school​

Answers

Answer:

Conflicts can be classified into five different types: structural, value, relationship, interest, and data [

Explanation:

Answer:

Conflicts can be classified into five different types: structural, value, relationship, interest, and data

Explanation:

follow me please

____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.

Answers

Answer:

Secrecy

Explanation:

Options:

A) Necessity.

B) Secrecy.

C) Integrity.

D) Encryption.

B) Secrecy Is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

5. The Shape Fill drop-down menu is used to

A b or c or d

Answers

Answer:

Change the color of the shape.

Explanation:

In the sentence, you must look at keywords, like "Fill" and "Shape".

The fact that it said shape fill means the tool would fill the inside of a shape.

Make sure to look at the definition of keywords to figure out what they mean.

Therefore, "Change the color of the shape" would be the correct answer.

-kiniwih426

________ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures. Group of answer choices Object-oriented Structured Unstructured Content-markup

Answers

Considering the programming layout, Structured programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.

Definition of Structured Programming Technique.

This is because Structured Programming techniques are a method that is employed to enhance the reliability and simplicity of the program code.

Configurations of Structured Programming Technique.

Structured Programming Techniques generally takes three structures body which include the following:

IF THEN ELSE DO WHILESequence

Hence, in this case, it is concluded that the correct answer is option B. "Structured."

Learn more about programming techniques here: https://brainly.com/question/17180300

How to square a number in java.

Answers

Answer:

num**2

Explanation:

To square a number in Java, you just take the number and use two asterisks (**) to denote an exponent, and then connect a 2 to it.

For example, if your number is 5:

5**2 in Java means 5^2, which is 25.

Just like how 5**3 in Java means 5^3.

Hope this helps.

What is the difference between the dom api and the html dom api.

Answers

The DOM-core is the object model that is common for all XML documents (including HTML) with elements and attributes. The HTML-DOM is an extension of the core DOM with more specific interfaces for the various HTML elements.

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches

Answers

Wireshark. It’s a free tool used to analyze packets.

Which development model emphasizes small revisions that enhance the code and expand the functionality until the entire program is built

Answers

Answer:

Iterative

Explanation:

is the model that emphasizes small revisions, unlike waterfall which is in a linear sequential flow.

Distributions of links in most networks follow a(n) __________ rule. radio_button_unchecked 60/40 radio_button_unchecked 90/10 radio_button_unchecked 50/50 radio_button_unchecked 80/20 SUBMIT

Answers

In most computer networks, the distribution of links follow an: 80/20 rule.

A network can be defined as a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together.

An 80/20 rule is also referred to as the Pareto Principle and it can be defined as a concept in cybersecurity, which states that there exist an unequal relationship between outputs and inputs, in the ratio of 80 percent to 20 percent respectively.

In most computer networks, the distribution of links follow an 80/20 rule by rationalizing the amount of traffic that must enter into a network (20 percent) with respect to the amount of traffic that must exit the network (80 percent).

Read more: https://brainly.com/question/22365112

TRUE OR FALSE: Bomb threat checklists are extremely valuable and should be made available at all workstations.

Answers

Answer:

True

Explanation:

"Bomb threat checklists are extremely valuable and should be made available at all workstations. If your organization does not have a bomb threat checklist, print the sample for future reference. Keep a copy of the checklist at your workstation at all times."

A file ____ shows the location of a file or folder

Answers

Answer:

Path

Explanation:

correct answer: Path

(Hope this helps can I pls have brainlist (crown)☺️)

Other Questions
Which term refers to the bones in the toes and fingers?tarsalshumerusphalangesmetacarpals which process do you preferred in identifying if the binomial is a factor of the polynomial? A can of crushed tomatoes holds 40 fluid ounces. How can a label designer name the same volume using metric units? Complete the explanation.The designer can use the ratio 1 fluid ounce 29.6 milliliters and then multiply:40 blank = . The designer might decide to convert mL to L and round to the nearest tenth of a liter: mL L What is the answer to 1422 ? 11/12 + p = 1/6what does p = aThe flu occurs when someone is infected with a specific virus. You may know you're sick when you have a fever, abody temperature above 98.6 F. Based on your understanding of the reading passage, how do you think a feverwould affect enzymes and chemical reactions in your body? Would it decrease, increase, or have no effect onthem? Explain your answer.Include one paragraph in your answer. A boy scout has 3 meters of rope. He cuts the rope into cords 3/5 m long. How many cords will he make? solve pls brainliest If each mole contains 6.023 x 10^23 atoms of magnesium. How many magnesium atoms reacted in your reaction? 400 mg of Magnesium were used. simplify the expression (b+3)+(2b-2) A girl has 7 skirts, 9 blouses, and 4 pairs of shoes. How many different skirt-blouse-shoe outfits can she wear 3. Kyle and Michael a rup a lap around a track. Kyle gets a 50 a meter head start and runs 3 meterspersecond. Michael runs at a speed of 4 meters per second. How long will it take for Michaelto reach Kyle? JOURNEY TO THE CENTER IF THE EARTHCreate a summary outline of five key ideas you have read so far.Type your response using the format shown. Task: Audience:Purpose:1.2.3.45. I NEED HELP!!!!!Develop an argument that explains whether or not the powers of the presidency as executed since the Great Depression have made the presidency too powerful an office. in metaphase what is missing from the cells and what happens to the chromosomes? Describe peristalsis and its role in indigestion. Write an algebraic expression to represent the verbal statement: The product of the difference of m and 7 and 6. The lower the temperature, the fewer crimes tend to occur. From the perspective of research methods, what does this mean Lesson Check (4.NBT.B.61. To divide 572 = 4, Stanley estimated to placethe first digit of the whole-number quotient.In which place is the first digit of the whole-number quotient? what subjects are most relevant to the study of romanesque cathedrals?