Your browser does not support JavaScript!

SwissQuail

SwissQuail is Information Technology student 👩‍💻
Last login
2 weeks ago
Joined
2022-10-17
SwissQuail latest posts

2 weeks ago - It describes how entities are related to each other. Answer: Question 12 Not yet answered Marked out of 1.00 Flag question Question text Data Manipulation Language is use for manipulating data in a database. Select one: True False Question 13 Not yet answered Marked out of 1.00 Flag question Question text Composite Attribute can be calculated from other attributes. Select one: True False Question 14 Not yet answered Marked out of 8.00 Flag question Question text Matching Type Test The interface presents a menu that lead to a user through request. Answer 1 Choose... The interface allows users to access their data through their mobile phone or mobile device. Answer 2 Choose... Used to manage data within the object schema. Answer 3 Choose... Display a form to be fill out by the user. Answer 4 Choose... Like Web search engines (engine like Google), which the user can specify a string or any keywords and expect to get a relevant result. Answer 5 Choose... Used to performed or rollback the changes that we made in the database using DML commands. Answer 6 Choose... Used to give or control privilege in a database. Answer 7 Choose... Used for creating tables, schema etc. in database. Answer 8 Choose... Question 15 Not yet answered Marked out of 1.00 Flag question Question text A thing that shares a common attribute. Answer: Question 16 Not yet answered Marked out of 1.00 Flag question Question text Attribute is a name for a set of similar things that you can list. Like objects, events, people. Select one: True False Question 17 Not yet answered Marked out of 1.00 Flag question Question text It is a question or an inquiry, sometimes loosely used for all types of interactions with databases. Answer: Question 18 Not yet answered Marked out of 1.00 Flag question Question text Who is responsible in administering the primary and secondary resource in the database? Answer: Question 19 Not yet answered Marked out of 1.00 Flag question Question text Database System automatically takes care of backup and recovery. Select one: True False Question 20 Not yet answered Marked out of 1.00 Flag question Question text A displayed schema is called Schema figure. Select one: True False

2 weeks ago - are function that is passed to another function and takes this "other function" as a parameter

2 weeks ago - A person learning to cook through an interactive recipe book is an example of a multimedia application in?

2 weeks ago - The development of the Internet of Things depends on cloud computing because it makes it possible to process, access, and store data efficiently through online services.

2 weeks ago - With its extensive storage, the Internet of Things eliminates reliance on local _________________.

1 month ago - answered Marked out of 1.00 Flag question Question text A well-written introduction is important because, quite simply, you never get a second chance to make a good first impression.

1 month ago - Translator which converts high-level language programs into machine language program is called Question 7Select one:

1 month ago - This staff respond to individual users' difficulties with computer systems, provide instructions and sometimes training, and diagnose and solve common problems.

1 month ago - This is a computer operating system based on the Debian Linux distribution and distributed as free and open source software, using its own desktop environment Answer: Question 9

1 month ago - Windows Server server operating system by Microsoft, as part of the Windows ME family of operating systems

2 months ago - What is an essential part of addressing data security in integrated systems?

2 months ago - Which integration approach involves breaking down a system into smaller, independent services that communicate with each other?

2 months ago - Refers to pixels per inch. It is a unit of measure for bitmap images and the devices that display them electronically.

2 months ago - Is to model the procedural flow of actions that are part of a larger activity Question 1Select one: a. Constraints b. Scenario Diagram c. Sequence Diagram d. Activity Diagram

4 months ago - It is a written expression of how the company will reflect an entrepreneur’s values, beliefs, and vision – more than just “making money.”

4 months ago - Improvement of pictorial information for human interpretation is part of Digital Image Proccessing

5 months ago - An individual may refer him/herself as man or woman based on the biological characteristics that he/ she has.

5 months ago - How is the principle of maximum entropy related to the second law of thermodynamics?

5 months ago - Dempster-Shafer theory is commonly used in which of the following fields?

5 months ago - should have functionality that helps you make sense of your requirements and ideally the tools should be adaptable to your methodology and processes rather than the other way around.

5 months ago - Enabled for requirements, tests, and test assets to allow distributed teams to collaborate and manage multiple versions of assets in parallel while maintaining data integrity and providing an audit history of changes throughout the project lifecycle. Question 20Select one:

5 months ago - There are two well-known forerunners of project management: [1], who developed the five management functions, and Henry Gantt, recognized as the father of planning and control techniques and inventor of the Gantt Chart.

5 months ago - is a short-term undertaking started to produce an original good, service, or outcome.

5 months ago - They deal with structures and algorithms without regard for the meaning or importance of the data that is involved. Question 9Select one:

6 months ago - The following is where environmental biotechnology can be largely applied except for?

6 months ago - The interactive output you see when you execute RMAN commands at the RMAN> prompt.

6 months ago - It provides homeowners and business owners with peace of mind in the knowledge that they are protected.

6 months ago - This was created to oversee corporate fraud from a financial perspective.

6 months ago - A system of policies and procedures which aim to manage and minimise the risk of people exploiting legitimate access to an organisation's assets or premises for unauthorised purposes.

6 months ago - It requires that building site(s) be safeguarded in a way that minimizes the risk of resource theft and destruction.

6 months ago - Elements in developing a comprehensive strategy for cyber risk management

6 months ago - ciphers used around 600 to 500 B.C. as much as it does to the AES ciphers used today

6 months ago - It applies to the ciphers used around 600 to 500 B.C. as much as it does to the AES ciphers used today.

8 months ago - It is used Dealing with highly sensitive information is _____to create forecasts or predictions about future events

8 months ago - Identify the correct web page for each rank from highest to lowest. For pages with the same ranking, follow the alphabetical order. Find the 2nd highest rank. Select one: a. C b. E c. B d. A

8 months ago - Identify the correct web page for each rank from highest to lowest. For pages with the same ranking, follow the alphabetical order. Find the 6th highest rank.

8 months ago - An action that is important for the sources of innovation and knowledge, especially for small companies. Select one:

8 months ago - Which of the foIt entails the conception of basic ideas and it is a product of laboratory scientistllowing is not one of the reason for having a conflict of interest in doing a research?

8 months ago - Which of the following is one of the reasons why nanotechnology is faces challenges when it comes to funding.

8 months ago - It is an example of a broader class of controls that attempt to specify who is trusted for a given purpose.

8 months ago - These is the mechanisms and techniques—administrative, procedural, and technical—that are instituted to implement a security policy.

8 months ago - They reflect concerns for preventing errors and omissions, and controlling the effects of program change.

8 months ago - Not yet answered Marked out of 1.00 Not flaggedFlag question Question text CBWFQ extends the standard WFQ functionality to provide support for user-defined traffic classes.

8 months ago - Packets are assigned to user-defined classes based on matches to criteria such as protocols, ACLs, and input interfaces. Select one:

8 months ago - Identification. Write your answer on the space provided. Symbol use as identical

8 months ago - Identification. Write your answer on the space provided. &&, ||, ! are examples of what operator

8 months ago - If I wanted to concatenate a word to a string variable I would use which of these?

8 months ago - Identification. Write your answer on the space provided. If I wanted to concatenate a word to a string variable I would use which of these?

8 months ago - The following comparison condition would return TRUE or FALSEsad3 <> 6)

8 months ago - the QoS model specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS guarantees on modern IP networks.