Suppose your friend plans, designs, creates, operates, secures, monitors, and maintains databases. She must be a(n) ___________.

Fill in the blank(s) with the appropriate word(s).


Database administrator

Computer Science & Information Technology

You might also like to view...

In the clock application, the entire nested loop must be contained within the outer loop in order to work properly.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

It is vital to have ____________________ security on all of the personal computers to defend against any attack that breaches the perimeter.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the shortcut key for the Rotate tool?

What will be an ideal response?

Computer Science & Information Technology

Which of the following terms refers to the process of determining and addressing the actual needs of your end user, rather than relying on assumption or personal preference?

A. Needs profiling B. User profiling C. User scenarios D. Needs assessments

Computer Science & Information Technology