The data cache is where the data read from the database data files are stored _____ the data have been read or _____ the data are written to the database data files.

Answers

Answer 1

Data is known to have cache. The data cache is where the data read from the database data files are stored after the data have been read or before the data are written to the database data files.

Cached data are simply called too be the information that is saved on one's computer or mobile devices after a person have visited or accessed a website.

A lot of Developers often make use of cached data to boast their online experience. A considerable number of consumers often want a website to load within two and three seconds.

Learn more from

https://brainly.com/question/23708299


Related Questions

what command can be used to repair a dual boot system?

Answers

Answer:

bootrec utility

Explanation:

It entirely depends on your version of windows and if you are even on windows, so I have no explanation, but for windows it is possible.

You have been asked to store a file with personal information on it. You need to be sure that only your user account can access the file, even if other user account have been granted permissions or if the disk is stolen. What standard NTFS feature can you use

Answers

Answer:

EFS

Explanation:

What is the role of a control in a system that is functioning correctly

Answers

A control system manages, commands, directs, or regulates the behavior of other devices or systems using control loops. It can range from a single home heating controller using a thermostat controlling a domestic boiler to large industrial control systems which are used for controlling processes or machines.

To break a page click the _______ tab​

Answers

Answer: Page Break (or press ctrl + enter on keyboard)

Explanation:

To break a text string into several lines, which means that the text string continues on the next line, the _____ character should be used.

Answers

Answer:

To break a text string into several lines, which means that the text string continues on the next line, the backslash character should be used.

What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.

Answers

Answer: B.) Design

Explanation: just took it

Answer:

b

Explanation:

________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. (1pts) Question 5 - ________ involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Answers

Answer:

Hey there!

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.

Hacking involves breaking into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data. Pretexting Phishing Hacking Spoofing

Hope this helped! :)

Question about microscope ​

Answers

Answer:

1.  c. diaphragm

2.  a. ocular lens

3.  b. fine adjustment knob

4.  c. course adjustment knob

5.  d. nosepiece

6.  a. simple light microscope

7.  d. A, B, and C

8.  a. light switch

Explanation:

Hope this helps.

cats do not eat tomatoes.scat is a cat.therefore ,scat does not eat tomatoes.

Answers

What does this mean??

define hyperlink in detail with its type​

Answers

Answer:

Hyperlinks are the primary method used to navigate between pages and Web sites. ... Text hyperlink – Uses a word or phrase to take visitors to another page, file or document. • Image hyperlink – Uses an image to take visitors to another page, file or document.

PLEASE HELP! WILL MARK AS BRAINLIEST JavaScript can be implemented using the _________ HTML tags in a web page.​

Answers

Answer:

JavaScript can be implemented using JavaScript statements that are placed within the ...  HTML tag

Explanation:

Answer : language

JavaScript is a scripting language, not a HTMLanguage type. It is mainly to do process at background and it needs document.

what is one benefit of utilizing social media to deliver advertising messages?

Answers

Answer:

Increased Brand Awareness.

Explanation:

Social media is one of the most cost-efficient digital marketing methods used to syndicate content and increase your business' visibility. Implementing a social media strategy will greatly increase your brand recognition since you will be engaging with a broad audience of consumers.

Answer:

An organization can test ads and promotions before bringing them to traditional media.

Explanation:

Which of the statements indicates that Shane & Co. is an ethical organization?
Shane & Co. deal in manufacturing plastic cups. Despite three years of operations, they haven’t been able to even break even. The irate investors are eagerly waiting for the next financial report that is due. Shane & Co. can manipulate the figures to show growth, however they choose to display the facts as it is. They are sure to lose some of the investors on board but are willing to take the risk.
Shane & Co. deal in manufacturing plastic cups
Despite three years of operations, they haven’t been able to even break even
Shane & Co. can manipulate the figures to show growth
however they choose to display the facts as it is
They are sure to lose some of the investors on board
but are willing to take the risk

Answers

Answer:

however they choose to display the facts as it isbut are willing to take the risk

Learning Objectives:

• understand when to use the different

print statements

• create a variable and assign it a value

• use Scanner to read in user input

• print the value of a variable using

printf




Output:

US state: Texas

Capital: Austin

The capital of Texas is Austin

Description:

Copy and paste the code below:

/*******************************************************

* Name:

* Assignment: A01

*******************************************************/


public class A01{


public static void main(String[] args){

// part1

System.out.print("x x x");

System.out.print("x o x");

System.out.print("x x x");

System.out.println();


// part2


}

}


Write your name in the comment on top. The red letters in the output are the user inputs.

This assignment consists of 2 parts.

First you demonstrate your understanding of the different print statements by modifying a

code segment. Then you read in two Strings and print a statement based on the user input.


Part1:

The code segment provided includes

three print statements that produce

the following output:


Change the code segment so that it

produces the following output:


Hint: you will need to change the number of

statements


Part2:

• Prompt the user to enter a state

• Read in the user response and assign

it to a String variable named state

Hint: before you can assign a value to the

variable state it needs to be declared

• Prompt the user to enter the name of

the capital

• Read in the user response and assign

it to a String variable named capital.

• Use printf and format specifiers to

print the following message:

The capital of state is capital

where you substitute state and capital with

the state and capital entered by the user.

Make your output look exactly like the output displayed above.

Make sure to read in the input next to the prompt but without touching it (use a blank to

separate the prompt from the user input). The output should use a single empty line to

separate the frog displayed in part1 from the output created in part2.

Answers

Answer:

take out the cord than put it back in than it shall work

??????????????????? Help

Answers

ms office is a software, that would make the most sense.

Answer:

d) MS Office

Explanation:

Microsoft Office is a program. Think of it this way .... Your operating system is like the engine of your car.

explain about cyber terrorism​

Answers

Explanation:

cyber terrorism is type of hacking group with give the country that are to illegal group

In every programming language, when you access data stored in an array, you must use a ____ containing a value that accesses memory occupied by the array. a. condition b. key c. subscript and. superscript

Answers

Answer: this app allow  u to have answers made for students 5 star ap but there are some ads that get  in the way

Explanation:

but it is good

test case Exercise 1: Consider the following system: A System reads four integer values from a user. The four values are interpreted as representing the lengths of the sides of quadrilateral shape. The system prints a message that states whether the shape is rectangle or square. Function: Description: Test Input Data:

Answers

The program displays if the side values of the quadrilateral is a square or rectangle. The required program is written in python 3 thus :

a = int(input('Enter integer input : '))

b = int(input('Enter integer input : '))

c = int(input('Enter integer input : '))

d = int(input('Enter integer input : '))

#the variables a, b, c, d takes prompt values from users which are used to compare if the quadrilateral is a square or rectangle.

if(a == b == c == d):

#using the assignment operator, compare the value of a, b, c and d

print('Shape is square')

#if the values are the same, the shape is a square

else :

print('Shape is Rectangle')

#otherwise, the shape is a rectangle

The sample run of the program is attached below.

Learn more : https://brainly.com/question/18405415

Samantha wants to begin searching for a job using the Web. The best source for her online search will probably be __________.

Answers

Answer:

C) A company's website

Explanation:

A file contains 5000 bytes. Calculate the size of the file in kilobytes.
Your answer must be to one decimal place

You should show your working.

Answers

Answer:

5 Kilobytes

Explanation:

5000 bytes ÷ 1000 = 5 kilobytes

Is it always best for a company to make decisions based on data, or are there some situations where they should not focus on data?

Answers

Answer:

data-driven decision

Explanation:

While 91% of companies say that data-driven decision-making is important to the growth of their business, only 57% of companies said that they base their business decisions on their data. Data-driven decision-making is a great way to gain a competitive advantage, increase profits and reduce costs!

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

Can you predict what changes will come to data storage in the next decade? 

Answers

Answer:

Explanation:

More data storage will become available currently there are kilobytes (KB), megabytes (MB), gigabytes (GB) and terabytes (1TB) of storage but in the future maybe there will be tetrabytes

With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.

Answers

Answer:

Your answer is...

Visual.

With visual voicemail, users can view message details, and in some cases read message contents without listening to them.

I hope this helped at all.

Helpppppp meeeeeeeeeeeee pleaseeeeee

Answers

Answer:

B

Explanation:

PATA drives, also known as ATA, ATAPI, or Integrated Drive Electronics (IDE), are the type of drives that were generally used in workstations until recently. PATA drives typically have a maximum transfer rate of 150MBps.

Cloud storage is a cloud computing model in which data are stored on remote servers accessed from the Internet, or “cloud.” For most PACS manufacturers, the cloud storage is primarily utilized as a long-term storage solution only.

Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advantage of this software option is _____.

Answers

Since Mavis is considering signing up for a hosted enterprise software solution for her small business, an advantage of the software is lower cost.

A hosted enterprise software solution is typically hosted off-site and in a private server that is owned by a third party. It's vital for organizations as it can be used in managing daily business activities.

The advantages of a hosted software model include reliable backup, reduction in IT costs, scalability of computing resources, etc. It is also necessary for managing critical business processes.

Read related link on:

https://brainly.com/question/25526416

DIRECTIONS: Organize your desktop. Name the 5 folders based on the files given below. Organize your own desktop by sorting the given files accordingly.

Please
I need help​

Answers

Answer: Music, Documents, PowerPoints, Pictures/Videos, Audios

if you are continuously working with the same range, then you may give a name to the range using _____ option in the data menu open office.
a define data.
b define range.
c define reference.
d define addres​

Answers

Answer : B. Define Range

If you are continuously working with the same range, then you may give a name to the range using define range option in the data menu open office. The correct option is b.

What is a range?

In computer programming, range refers to the interval that includes the upper and lower bounds of an array's variable values. The interval between data points is referred to as the range in statistics.

The domain of a function is the set of values that can be plugged into it. This set contains the x values in a function like f. (x).

A function's range is the collection of values that the feature can take. This is the set of values that the function returns after we enter an x value.

If you are constantly working with the same range, you can give it a name by selecting the define range option from the data menu in Open Office.

Thus, the correct option is b.

For more details regarding range, visit:

https://brainly.com/question/28135761

#SPJ6

Software whose code is made freely available to others for use, augmentation, and resale is referred to as:

Answers

Answer:

Open Source Software

Explanation:

web browsers save website information in their _________, which helps the site load faster on future visits.

Answers

Answer: cache

Explanation:because I took the quiz

Other Questions
A. What does each of these points represent in the is situation: (0, 0), (1, 55), and (5, 275)?What does each of these points represent in this situation (0, 0), (1, 55) and (5, 275)? Graph shows Mr. Browns road trip, with time (h) on the x-axis and distance (mi) on the y-axis. Points marked on the line graph are at (0, 0), (1, 55) and (5, 275). Margin Buying refers to the practice of Find the mode of project scores in math class 1 , 2 , 4 , 4 , 3 , 3 , 4 , 3 , 4 , 3 , 3 , 1 What foods were included in hunter-gatherers diets? Choose four answers. meats vegetables cheese nuts and seeds fruit bread When someone in today's society is accused of something bad, what type of evidence is needed in order for people to believe that the accusation is true? Describe marketing tactics that the credit industry uses to trick people into getting into debt. What was the goal of the Social Security Act? Explain any seven civic duties of a citizens in brief For which equations is 8 a solution? Select the four correct answers.x + 6 = 2x + 2 = 10x minus 4 = 4x minus 2 = 102 x = 43 x = 24StartFraction x Over 2 EndFraction = 16StartFraction x Over 8 EndFraction = 1 Help !! I dont understand which hormone released from the hypothalamus regulates gonad function? Can someone please help with my math homework? this is so confusing. What is 2 1/4 divided by 4 2/3 Phn ng phn hy ca 1 este trong mi trng kim: RCOOR + NaOH RCOONa + ROH mt na lng ban u ca RCOOR v NaOH chuyn thnh sn phm 270C cn thi gian l 200pht. Hi 570C cng chuyn mt na lng ban u ca RCOOR v NaOH thnh sn phm th cnbao nhiu pht? Cho bit h s nhit ca phn ng trn = 2,8. Because B vitamins are ______, very little is stored and excess intakes end up in the urine or stool. In lyric poetry, a single speaker expresses thoughts and emotions. T F. your order is supposed to be delivered between 5pm-6pm With her new trainer, Judy now bikes at an average speed of 24.1 MPH. That is 20.5% faster than she averaged with her old trainer. How fast did she bike, on average, before training with the her new trainer? . What is the best definition of a false dilemma?when someone uses half-truths, or generalizations, to support a claimwhen someone attacks the opponents of the argument to discredit themwhen someone presents an either/or scenario but there are other optionswhen someone states that since everyone agrees with a statement, it is correct I need the answer ASAPRead the sentence from the speech.In this way, any potential opponent would be intimidated, and security, so ardently desired by all of us, brought to us and all of humanity. *A. DespairinglyB. NonchalantlyC. PassionatelyD. Inadvertently