Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide citations from the literature.

Answers

Answer 1
I have no clue what you are talking about I am so sorry

Related Questions

You have an image of building but there are people standing on the far left side. You would like to remove those people. Which tool do you need ?

Answers

Answer:

cropping tool

Explanation:

since the people are on the far left you can just crop the image

Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.
a) true
b) false

Answers

Answer:

a) true

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords.

An example of best practices in cybersecurity is the use of alphanumeric password with certain composition and strength, such as a minimum of eight (8) characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

A dictionary attack typically involves accessing a list of commonly used passwords by end users rather than a random guess.

Hence, organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords.

A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts: The user profile for User l5 could not be loaded. Ntuser.dat is missing or corrupt. What would be MOST appropriate for resolving this issue?

Answers

Answer:

Press the function key F8 to boot into safe mode and log in as User15. Then, remove extraneous startup programs.

Explanation:

This is a problem that is related to a missing or corrupt system file responsible for managing user accounts and profiles on a computer system.

In this scenario, a user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and password. A technician inspects the logs in Event Viewer and finds a message that corresponds to the user's login attempts: The user profile for User l5 could not be loaded. Ntuser.dat is missing or corrupt.

Thus, what would be most appropriate for resolving this issue is to press the function key, F8 to boot into safe mode and log in as User15 and then remove extraneous startup programs that are running in the background while a computer is booting (startup).

State what’s printed for each println in the code below:

public static void main(String args[ ])

{

MyClass theObj = new MyClass( );
theObj.gravy = 107.43;
String s = "hello";
int xray[] = {1, 2, 3, 4, 5};
double floozy = 97.4;
myMethod(floozy, theObj, xray, s );
System.out.println(floozy); // Problem 1:
System.out.println(theObj.gravy); //Problem 2:
System.out.println(xray[2]); //Problem 3:
System.out.println(s); //Problem 4:
}
public static void myMethod(double floozy, MyClass anObj, int a[ ], String s)
{
floozy = 13.1;
anObj.gravy = 10.001;
a[2] = 100; s = "good bye";
}

Answers

Answer:

Explanation:

Each of the following println statements will print the following values

ystem.out.println(floozy); // Problem 1:   97.4

System.out.println(theObj.gravy); //Problem 2:  107.43

System.out.println(xray[2]); //Problem 3:  100

System.out.println(s); //Problem 4: Hello

This is because out of all of the variables that the myMethod gives a value to, the only variable that is being saved back to the global variable in the main method is a[2]. The other variables are being saved as instance variables and not being returned. Therefore, when the println statements are called they target the local variables in the main method.

Most Information Technology careers require workers to perform their jobs in
A. a home office.
B. a business office.
C. a secure office.
D. an off-site office.

Answers

Answer:

b on edge 2020

Explanation:

Answer:

b

Explanation:

Consider the following pseudocode:

Get the Sqrt of 9.
This pseudocode is an example of what?

A
An event that contains a parameter

B
A function that contains an argument

C
An object that contains a parameter

D
A class that contains an argument

Answers

Answer: sorry I couldn’t help but Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.

Explanation:

Select all correct answers. Technology helps:

A) make things cooler

B) make Things easier

C) make things faster

D) solve Problems

Answers

Answer:

a,b,c,d

Explanation:

it helps with all of those things

Answer:

D. Solve Problems

Explanation:

Technology has played a crucial role in keeping so many people alive through life support machines and other specialized health equipment. Technology also aids in the scientific research of new medicines and cures that are beneficial to the entire human race. Business and Commerce. Business is not as usual since the internet came into this world.

what benefit can we get form using computer in education?​

Answers

Teaches you technology uses, and what we can do with them

Assuming dataFile is an ofstream object associated with a disk file named payroll.dat, which of the following statements would write the value of the salary variable to the file
A) cout < B) ofstream C) dataFile << salary;
D) payroll.dat <

Answers

Answer:

dataFile << salary;

Explanation:

To write salary to a file (payroll.dat) using ofstream, you make use of the following instruction:

ofstream dataFile;

myfile.open ("payroll.dat");

myfile <<salary;

myfile.close();

This line creates an instance of ofstream

ofstream dataFile;

This line opens the file payroll.dat

myfile.open ("payroll.dat");

This is where the exact instruction in the question is done. This writes the value of salary to payroll.dat

myfile <<salary;

This closes the opened file

myfile.close();

III. FILL-IN THE BLANK (five points each)
11. Open divided scales have scales going in
directions.
12. There are
groups of scales.
13. The open divided scales have an
unit preceding zero.
14. The triangular scale can have up to
different scales on one piece of plastic.
15. The mechanical inch is divided into
equal parts.

Answers

Jsjejshxjskksnxbfbsjchjsjens

When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accessors variables

Answers

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

Write the command and explain about each formula in MS Excel


1. SUM

2. AVERAGE

3. MAx

4. MIN

5. COUNT

Answers

Answer:

1. SUM  --- The SUM function is used to sum all the values that are in a given range. Thus, for example, if you want to add the values between cells A1 and A3, you must write the following command: =SUM(A1:A10)

2. AVERAGE  --- The AVERAGE function allows you to average a range of values, throwing the average of these values in the cell where the function is typed. For example, if you want to average the values included between B1 and B3, you should write the following function: =AVERAGE (B1: B3).

3. MAX --- The MAX function, for its part, returns the maximum value of the values included in the function. For example, if the maximum value included between the values C1 and C3 is known, the following function must be written: =MAX (C1: C3).

4. MIN  --- The MIN function, in turn, allows to identify the minimum value of the range of values included in the function. For example, if the minimum value included between the values D1 and D3 is known, the following function must be written: =MIN (D1: D3).

5. COUNT --- The COUNT function, finally, is used to count all the cells that have numbers, which have been included in the range of the function. For example, if you want to count all cells that contain numbers between the values E1 and E3, you must write the following function: =COUNT (E1: E3).

* HELP FAST*Which Section do you need to go on in the Ribbon, to get to the button that will allow you Create a Link between text boxes?

Answers

Answer:

Insert

Explanation:

Take with a pinch of salt cuz I'm not a coder or anything, but I've got a few skillz.

How do motion sensors determine in simation
about a person?
They store information regarding a person's
health.
They record a person's surroundings.
They record who a person interacts with.
They track where they go and how they move.

Answers

Answer:

They record a person's surroundings.

Explanation:

Motion sensors like the passive infrared (PIR) work by detecting changes in the infrared radiation given off by objects in their surroundings. Normally most objects give off a small amount of infrared radiation. Human bodies, however, give off a large amount of infrared radiation.

So when motion sensors detect the presence of a person in a surrounding, they give off an alarm to indicate the presence of an intruder.

Answer:D

Explanation: the track where they go

Difference between analog and digital computer ??

Answers

Answer:

The analogue computer works on a continuous signal. The digital computer works on a discrete signal. The output is a voltage signal, they are not exact values and are in graphical form.

Which function in spreadsheet software can be used to predict future sales or inventory needs?

Answers

create a forecast, Excel creates a new worksheet that contains both a table of the historical and predicted values and a chart that expresses this data. A forecast can help you predict things like future sales, inventory requirements, or consumer trends.

Answer:forecast

Explanation:

Use the factorial operation to evaluate 10!.
A) 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1
B) 9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
C) 10 + 9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1
D) 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Answers

Answer:

D

Explanation:

The definition of n! is n x (n-1) x (n-2) x ... x 1.

So 10! = 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 i.e. D.

Answer:

D) 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Explanation:

The problem here is to use the factorial method to find;

    10!

The factorial of any number is given as:

       a!  = (a - 1) x (a - 2) .........(a - n)

It is the product of any integer from 1 to that number.

So;

   10!   = 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

The solution is therefore 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

Consider the following code segment.
firstList + ["guitar", "drums", "bass"]
secondList + ["flute", "violin"]
thirdList = []
thirdList + firstList
firstList secondList
secondlist thirdList
What are the contents of secondList after the code segment is executed?
А
[]
00
["guitar", "drums", "bass"]
с
["flute", "violin"]
D
["flute", "violin", "guitar", "drums", "bass"]

Answers

Answer:

[tex]secondList = ["guitar", "drums", "bass"][/tex]

Explanation:

At the third line of the code segment:

An empty list thirdList is created

At the fourth line of the code segment:

The content of firstList is passed into thirdList

i.e. [tex]thirdList = ["guitar", "drums", "bass"][/tex]

At the fifth line of the code segment:

The content of secondList is passed into firstList

i.e. [tex]firstList =  ["flute", "violin"][/tex]

At the fifth line of the code segment:

The content of thirdList is passed into secondList

i.e. [tex]secondList = ["guitar", "drums", "bass"][/tex]

If you wanted to help your phone , a nonliving thing , perform the process of life which is to gain energy which would be the best description of what to do ?

Help

Answers

Answer:

d. plug it into the charger.

Explanation:

What is the recommended solution if a computer performs slowly?

Answers

Answer:

Not sure what the class/context is, but here's what I'd do to diagnose a problem like that:

- Check to see what programs have high utilization of system resources in task manager and end them

- Prevent background startup processes from occuring on restart or from running in the background during normal use

- Figure out what hardware component is bottlenecking the system and upgrade it (HDD to SSD would be one example)

- If the issue is malware related, I would "flatten" the PC by wiping the entire system and reinstalling the OS (though some malware can persist even across this)

Source: I've worked as labs support

If a computer is performing slowly, there are several recommended solutions one can try to improve its performance, such as closing unnecessary programs, restarting the computer, etc.

Reviewing the programs that automatically start when the computer boots up and disabling unnecessary startup programs to reduce the time it takes for the computer to start and free up system resources. The specific solution may vary depending on the computer's operating system, hardware, and specific performance issues. It's always a good idea to back up important files before making any changes to your computer's configuration. If the performance issues persist, seeking assistance from a computer technician or IT professional may be necessary.

Learn more about computers here.

https://brainly.com/question/32297640

#SPJ6

A specification can be a written document, a set of graphical, a formal mathematical model, a collection of usage scenarios (or, use cases), a prototype, or any combination of these.
A. True
B. False

Answers

Answer:

The given statement is "True". A further explanation is given below.

Explanation:

The specification would be a necessary condition that is explicitly indicated, for obvious reasons, concerning the great components throughout the prototype of being something. A detailed explanation of that same performance aspects, normally with particular established standards, is presented in terms appropriate to lead to the creation both for real manufacturing and building methods of such a component with either the personality traits mentioned throughout the structural performance.

So the above is the appropriate response.

If you are working in a word-processing program and need to learn about its features, the best place to get assistants is from the ________.
A. application's help menu
B. desktop
C. toolbar
D. start menu

Answers

Answer:

A

Explanation:

plz mark me brainlies

Answer:

A. Application's help menu

Explanation:

How to do brainliest

Answers

If the reply that someone put has a blue crown you click it and it will give them brainliest but it usually won’t work unless there are two answers

Gamification and virtual reality is the future of education . I need a speech on this topic

Answers

Hahaha jsisienenwisjejwje

DRAG DROP -A manager calls upon a tester to assist with diagnosing an issue within the following Python script:#!/usr/bin/pythons = "Administrator"The tester suspects it is an issue with string slicing and manipulation. Analyze the following code segment and drag and drop the correct output for each string manipulation to its corresponding code segment. Options may be used once or not at all.Select and Place:

Answers

Answer:

The output is to the given question is:

nist

nsrt

imdA

strat

Explanation:

The missing code can be defined as follows:

code:

s = "Administrator" #defining a variable that hold string value

print(s[4:8])#using slicing with the print method  

print(s[4: 12:2])#using slicing with the print method  

print(s[3::-1])#using slicing with the print method  

print(s[-7:-2])#using slicing with the print method    

In the above code, a string variable s is declared, that holds a string value, and use the multiple print method to print its slicing calculated value.

can you answer this question?

Answers

Answer:

The SIZE constant is not definedThe variable i should be defined at the start of the function, not within the condition of the while loopThe main function returns no value.  Generally they should return a zero on success.The printf text "%d" should actually be "%f".  %d treats the variable as though it's an integer.

in java please
In this exercise, you will need to create a static method called findString in the MatchingString class that should iterate over String[] arr looking for the exact match of the String that is passed as a parameter.

Return the index of the array where the String is found; if it does not exist in the array, return -1.

For example, if the word “Karel” is passed in, your method would return 1.

Answers

Answer:

Explanation:

The following code is written in Java. It is a static method that takes in a String parameter and loops through the String array called arr comparing each element in the array with the word parameter that was passed. If it finds a match the method returns the index of that word, otherwise it will return -1

  public static int findString(String word){

               int index = -1;

               for (int x = 0; x < arr.length; x++) {

                       if (word == arr[x]) {

                               index = x;

                               break;

                       }

               }

               

               return index;

               

       }

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations. After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack?
A. DOS
B. SSL Stripping
C. Memory leak
D. Race condition
E. Shimming
F. Refactoring

Answers

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

what is mass communication​

Answers

Hey there!

When you see the word “mass communication” think of an article written on the newspaper or a person interaction on a social media platform. You’re talking to a variety of LARGE groups but not physically there in their appearance, right? (This is an EXAMPLE.... NOT an ANSWER)

Here’s SOME examples

- Political debate campaigns

- Journalism (you could find some in articles / newspapers passages)

- Social Media Platforms

- A company PROMOTING their brand as a COMMERCIAL on the television/radio

Without further a do... let’s answer your question….......

Basically “mass communication”

is the undertaking of media coordination which produce and carries out messages with HUGE crowds/public audiences and by what the message process striven by their audience ☑️

Good luck on your assignment and enjoy your day!

~LoveYourselfFirst:)

Gamification and virtual reality is the future of education

Answers

Answer:

Education is expected to be the fourth largest sector for VR investment. VR in education is predicted to be a $200 million industry by 2020, and a $700 million industry by 2025. 97% of students would like to study a VR course.

Explanation:

Other Questions
Graph the following inequalities: a. + y > 4 b. y + 5 4 Someone pls help me pls!!! The group of test subject that are NOT given the experimental treatment Ilwhat? At the height of 800 meters, a skydiver falls from an airplane flying horizontally at 40 m/sec. What is the horizontal distance of the skydivers travel before they "hit" the ground? SAS, SSS, ASA, OR there is not enough information to determine congruence. please answer this asap ! What is your opinion on the use of stem cells, obtained from fertilized eggs or early stage embryos You have been given three plants: Two have solid black flowers, and one has grey flowers. You cross each black-flowered plant to the grey plant with the following results: Parents: black #1 X grey F1: 87 solid black, 83 spotted black Parents: black #2 X grey F1: all black To try and make sense of these results, you intercross the solid black-flowered F1 plants from cross #2 with the following results in the F2: 132 black 35 spotted black 11 grey What are the genotypes of the parents, F1 and F2 generations? Express each ratio as a unit rate. Round to the nearest tenth, if necessary. 140 miles on 6 gallonsa.23.3 mi/galc.0.042 mi/galb.840 mi/gald.13.6 mi/gal The substance krypton has the following properties normal melting point 115.9 K normal boiling point: 119.8 K triple point: 0.72 atm. 115.8 K critical point: 54.3 atm. 209.4 K A sample of krypton at a pressure of 1.00 atm and a temperature of 149.2 K is cooled at constant pressure to a temperature of 107.8 K Which of the following are true? a) The final state of the substance is a solid b) One or more phase changes will occur c) The final state of the substance is a liquid d) The sample is initially a gas e) The solid initially present will vaporize. Working out Choose a person aged 19 to 25 years at random and ask, "In the past seven days, how many times did you go to an exercise or fitness center or work out?" Call the response Y for short. Based on a large sample survey, here is a probability model for the answer you will get:8Working out Choose a person aged 19 to 25 years at random and ask, "In the past seven days, how many times did you go to an exercise or fitness center or work out?" Call the response Y for short. Based on a large sample survey, here is a probability model for the answer you will get:8 Researchers have found that the more World Cup soccer a student watches the better they do on their exams. Students reported the amount of World Cup soccer they had watched in the two weeks leading up to their midterm exams. The more soccer watched, the better the students exam grades tended to be. Researchers are not yet sure why soccer viewing improves intelligence, but plan further research during the next World Cup qualifiers as well as research examining other sports. Which of the following BEST captures the most significant flaw in this research as it is written? What type of design is this? Using an exam score as a measure of intelligence is an example of? chau made $270 for 18 hours of work. At the same rate, how many hours would he have to work to make $105 Roses are red and violets are blue i have something hardwhen it goes in it is hardwhen it comes out it is softwhen if you keep it in longer it gets strongerit comes out dripping wetand comes out softit could also be good for the throughcomment what u think it is Describe the mood of a lynching. What were those "in charge" likely thinking, feeling,saying/chanting? Please help me and I'll give you a Brainly star ILL GIVE 30 POINTS PLSS HELP ITS LIKE EASY JUST THA IM D.UMB How did corruption in government contribute to the decline and fall of the Western Roman Empire? HELP WHAT EQUATION MATCHES THE GRAPH? PLEASE HELP ME 5. (0,0) and (-2,-8) Slope=_ Equation=_ I dont get this at all please help!! Which diagram most correctly represents the process of mitosis?