answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetradugi [14.3K]
2 years ago
15

Why can a failure in a database environment be more serious than an error in a nondatabase environment?

Computers and Technology
2 answers:
Elina [12.6K]2 years ago
5 0
Failure in a database environment is more serious then a non data base because if you lose important information you may not get it back and failure in a nondatabase environment the problem may be more easier to solve
Anestetic [448]2 years ago
3 0

Answer:

Failures in database environments can occur due to hardware failures, power failures and software/programming error.

Of these three errors, the non-database environment can survive the hardware failure due to recovery processes and the Software/programming error.

Explanation:

Databases are quite fragile when they hit a hardware failure if you try to recover them (Most of them have raw files that can only be read by certain types of Database Management Softwares) this does not exist in the Non-Database Scenario as most of these records are kept in files.

Software failures can occur when a wrong query is used to retrieve data from a DBMS. This can be frustrating except the user gets the right query.

You might be interested in
Mrs. Johnson is here today to receive an intercostal nerve block to mitigate the debilitating pain of her malignancy. Her cancer
Furkat [3]

Answer:

The correct answer is:

a. M54.6, C79.51, C80.1

Explanation:

-  M54.6 Pain in thoracic spine. It is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM M54.

- C79.51: Secondary malignant neoplasm of bone, it is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes.

- G89. 3 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM G89.

Malignant neoplasm of anus, unspecified

Neoplasm related pain (acute) (chronic)

Pain in thoracic spine. M54. 6 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM M54.

Malignant (primary) neoplasm, unspecified

- C80. 1 is a billable/specific ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes. The 2020 edition of ICD-10-CM C80.

5 0
2 years ago
Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?A. DataB.
Tema [17]

Answer:

Option A is the correct answer for the above question.

Explanation:

Data can be defined as raw fact which can be useful when it will be processed. The processed data can be formed as information. The data can be anything. It can b e text or audio or images or video. The above question asked about the term which is an unprocessed item and can form information after processing. Then the answer is Data which stated from the option A. So Option A is the correct answer while the other is not because--

  • Option B states about instruction which is useful to process the data.
  • Option C states about Programs that can be formed when one or more instruction is grouped.
  • Option D states about the information that the user can get after processed the data.

6 0
2 years ago
Information in​ folders, messages,​ memos, proposals,​ emails, graphics, electronic slide​ presentations, and even videos create
valkas [14]

Answer:

The answer is "Unstructured"

Explanation:

In comparison, unstructured information applies to information, which doesn't suit the conventional column and rows concerning databases properly. It is also known as sources, that include mails, audio and video files, web pages and posts in  communication networks.

  • This tracks and communicates on travel and object flow-through sensors and much more.
  • These types of data are used in both companies and organizations.
5 0
2 years ago
Consider the following method intended to modify the parameter names by removing all instances of the String n.
Anastasy [175]

Answer:

int i = 0; i < names.size(); i++

Explanation:

The ArrayList must be read in the forward direction, and it is going to start from 0 certainly. Also, the iteration is going to end when i is exactly one less than the size of the ArrayList. And this is possible only if we choose the option mentioned in the Answer section. In this, i starts from 0 and iterates till i is one less than name.size() which is the size of the ArrayList.

7 0
2 years ago
Write a function called add_tuples that takes three tuples, each with two values, and returns a single tuple with two values con
Leni [432]

In Python, tuples are indeed a data structure that also stores an ordered sequence of unchanging values, and following are the Python program to the given question:

Program Explanation:

  • Defining a method "add_tuples" that takes three variables "firstTuple, secondTuple, thirdTuple" into the parameter.
  • After accepting the parameter value a return keyword is used that adds a <em><u>single tuple with two values</u></em> and returns its value into the form of (x,y).
  • Outside the method, two print method is declared that calls the above method by passing value into its parameters.

Program:

def add_tuples(firstTuple, secondTuple, thirdTuple):#defining a method add_tuples that takes three variable in parameters

   return firstTuple[0]+secondTuple[0]+thirdTuple[0],firstTuple[1]+secondTuple[1]+thirdTuple[1] #using return keyword to add value

print(add_tuples((1,4), (8,3), (14,0)))#defining print method that calls add_tuples method takes value in parameters

print(add_tuples((3,2), (11,1), (-2,6)))#defining print method that calls add_tuples method takes value in parameters    

Output:

Please find the attached file.  

Learn more:

brainly.com/question/17079721

4 0
2 years ago
Other questions:
  • Allows you to manually add an entry to the arp cache that resolves the ip address inetaddr to the physical address etheraddr. wh
    13·1 answer
  • What is a typical grace period for a credit card...
    15·2 answers
  • Write a program in c or c++ to perform different arithmeticoperation using switch statement .the program will take two inputinte
    10·1 answer
  • Write a program to determine all pairs of positive integers, (a, b), such that a &lt; b &lt; 1000 and [a2 + b2 + 1)/(ab) is an i
    13·1 answer
  • The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati
    7·2 answers
  • Drag each tile to the correct box.
    12·1 answer
  • In this exercise we look at memory locality properties of matrix computation. Th e following code is written in C, where element
    9·1 answer
  • Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public
    14·1 answer
  • JAVA...Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
    9·1 answer
  • Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!