answersLogoWhite

0

📱

Database Programming

Databases are collections of tables that maintain and display information, often collaboratively; this information can be used for interaction with an application or gaining general knowledge. Questions about database engines and modifying or using them belong in this category.

8,803 Questions

What is a sub program?

A sub program is a set of easily reusable code that makes a program easier to read and understand, and it also makes the file size smaller.

What is cell attribute?

A cell attribute is the way in which the data inside the cell is displayed e.g. currency or percentage.

What is a boolean operation?

A boolean operator is a simple word such as and, or, or not which are used to narrow or expand searches. Boolean operators are also used in programming to determine a path of action often depending on the status of a variable.

What are skew segments?

segments that are notcoplanar. (not in the same plane)

What is incomplete binary tree?

Incomplete Binary Tree is a type of binary tree where we do not apply the following formula:

1. The Maximum number of nodes in a level is 2

How can you install oracle 8i in vista?

8i is oldest version of oracle which is notsupported in vista. vista supports 10g or elder version of oracle.

by Bhavesh Patel

What thoughts trigger depersonalization?

Depersonalization can be triggered by feelings of anxiety, stress, or overwhelming emotions, leading individuals to feel detached from themselves or their surroundings. Thoughts of inadequacy, fear of losing control, or an intense focus on self-awareness can also contribute to this sensation. Additionally, traumatic experiences or significant life changes may provoke feelings of unreality, causing a disconnect from one’s identity or environment.

How do you remove the computer viruses without an antivirus?

To remove computer viruses without using antivirus software, first disconnect from the internet to prevent further infection. Restart your system in safe mode and delete any unfamiliar programs or files. Use built-in tools like Windows Defender Offline Scan or Task Manager to stop suspicious processes. Clear temporary files, reset your browser, and update your system to close security gaps. Always back up important data before cleaning.

What is the difference between numeric and non-numeric keys in RDBMS?

Numeric means a number is used. For a key, that would usually be an integer. Non-numeric keys can include any symbols (i.e., text). In theory, you could also use other specialized data types, for example, dates. Check the data types available by a specific RDBMS; details may vary. Almost any data type can be used for a key; although variable-length data types such as BLOB are either not supported or not practical to use.

Why is it important to select the proper field size for a field whose data type is number?

Because you want the field to be large enough to store the data. Also, you may not want to have it too large if you know values are going to be in a small range. If you allocate a large amount of space, that will be used by each record, even when actual values are small, so it is more efficient to use the right sizes. So, in short, you choose the appropriate size to ensure you don't have too little or too much size allocated for your intended data.

How do you install MS Query?

Re-run MS Office setup from CD choose to modify setup. Check "options" checkbox to explore components and in MS Office Tools, I believe, sellect MS Query to be installed. Make sure not to uncheck existing components

Bytes are arrangements of?

A Byte is an arrangement of eight Bits (Binary digITs)

What is a horizontal series of cells in a table called?

A horizontal series of cells in a table is usually called a "row". A vertical series of cells in a table is usually called a "column".

Convert 5 gb to MB?

5 GB to is 5120 MB, since 1 GB = 1024 MB. For the purpose of easy calculations, however, it is taken that 5 GB = 5000 MB.

What is flight entity and ticket entity?

it means..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................yourface

Define connection oriented and connectionless transmission with examples?

TCP has an acknowledgement technique of checking if data packet is received either at the client or at the server end, this is what makes it a connection oriented network service.

while

UDP does not guarantee reliability of ordering or acknowledgement the way TCP does. Datagrams may appear out of order, missing or appear duplicated. This is what makes it a connectionless oriented network service.

What are the security issues in database management system?

Database Security Issues
  • Daily Maintenance: Database audit logs require daily review to make certain that there has been no data misuse. This requires overseeing database privileges and then consistently updating user access accounts. A database security manager also provides different types of access control for different users and assesses new programs that are performing with the database. If these tasks are performed on a daily basis, you can avoid a lot of problems with users that may pose a threat to the security of the database.
  • Varied Security Methods for Applications: More often than not applications developers will vary the methods of security for different applications that are being utilized within the database. This can create difficulty with creating policies for accessing the applications. The database must also possess the proper access controls for regulating the varying methods of security otherwise sensitive data is at risk.
  • Post-Upgrade Evaluation: When a database is upgraded it is necessary for the administrator to perform a post-upgrade evaluation to ensure that security is consistent across all programs. Failure to perform this operation opens up the database to attack.
  • Split the Position: Sometimes organizations fail to split the duties between the IT administrator and the database security manager. Instead the company tries to cut costs by having the IT administrator do everything. This action can significantly compromise the security of the data due to the responsibilities involved with both positions. The IT administrator should manage the database while the security manager performs all of the daily security processes.
  • Application Spoofing: Hackers are capable of creating applications that resemble the existing applications connected to the database. These unauthorized applications are often difficult to identify and allow hackers access to the database via the application in disguise.
  • Manage User Passwords: Sometimes IT database security managers will forget to remove IDs and access privileges of former users which leads to password vulnerabilities in the database. Password rules and maintenance needs to be strictly enforced to avoid opening up the database to unauthorized users.
  • Windows OS Flaws: Windows operating systems are not effective when it comes to database security. Often theft of passwords is prevalent as well as denial of service issues. The database security manager can take precautions through routine daily maintenance checks.

These are just a few of the database security problems that exist within organizations. The best way to avoid a lot of these problems is to employ qualified personnel and separate the security responsibilities from the daily database maintenance responsibilities.