vijay
single user software use by single user eg ms outlook, quick access one can use and overwrite as weel but in multiuser data base multiusers can access it at same time eg college website spread sheet data base
Hi, 1. Provide for efficient sorage,update and retrieval of data. 2. Provide high integrity to promote user trust in the data.
A data of an organization is confidential and may contain some important information. For the security reasons the access to database is given only to authorized users. When an unauthorized user try to access that data , he is known as data thief.Data thief is an unauthorized user who have illegal access to the data in the data base . Data thief is just like hacker who access the data for illegal purpose.
-When user input some data the ram took the data and store it on temporily base....tats the work of RAM
data user is person that uses data or the owner of the data
The program is a Spreadsheet. eg Microsoft Excel
A data base trigger occurs when a DML operation is performed on a data base table. A form trigger occurs when the user presses a key or navigates between fields on the screen.
DBA -Data Base Administrator Functions of DBA might include monitoring the 'health' of the database; grant/revoke user permissions; create and maintain schemas/tables and any other data base entities, monitor the data base usage and generate reports, run updates, etc.
DBMS can be classified in the following ways,1. Based on Data ModelRelational Data ModelObject Data ModelObject Relational Data ModelExtended Relational Data ModelXML ModelHierarchical Data ModelNetwork data Model2. Based on Number of UsersSingle User SystemMulti-User System3. Based on Number of SitesCenteralized systemsDistributed DBMSs(DDMSs)Homogeneous DDMSHetrogeneous DDMS
Yes AnswersDOTcom is a user edited data base, which gets its information in a question answer style.
to create user defined functions the user defined data is needed nd its useful to the programmer to create its own data.
User data can be obtained through various methods such as online surveys, user interviews, tracking user behavior on websites or apps, and analyzing existing customer databases. It is important to always obtain user data ethically and with the user's consent.