1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
2 years ago
12

An entity is said to be _____-dependent if it can exist in the database only when it is associated with another related entity o

ccurrence
Computers and Technology
1 answer:
kkurt [141]2 years ago
7 0

An entity is said to be existence -dependent if it can exist in the database only when it is associated with another related entity occurrence.

<h3>What is a database ?</h3>

A database in computing is a structured collection of data that is electronically accessible and stored. Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system. Data modeling, effective data representation and storage, query languages, security and privacy of sensitive data, and distributed computing challenges, such as providing concurrent access and fault tolerance, are all part of the design of databases.

In order to collect and process data, a database management system (DBMS) communicates with applications, end users, and the database itself. The primary tools offered to manage the database are also included in the DBMS software.

To learn more about database from the given link:

brainly.com/question/518894

#SPJ4

You might be interested in
An international pharmaceutical company is fully compliant with local and international regulations. However, they suffered a ma
lesya [120]

Accenture respond to the international pharmaceutical company the reason of the data breach is because compliance to local and international laws does not necessarily enforce security.

<h3>What are the three main causes of a data breach?</h3>

A hack, such as phishing or stolen credentials; a mistake, such as lost devices or wrong system configuration; or a physical attack, such as a skimmer at a gas station pump that collects credit card data, all resulted in data being exposed or stolen.

Thus, due to there is not an enforcement of security.

For further details about data breach, click here:

brainly.com/question/24174542

#SPJ1

7 0
3 years ago
In 1971, Intel created and marketed the first microprocessor chip, called the Intel 4004. What was significant about this invent
PilotLPTM [1.2K]
The answer is D

<span>D) It allowed computers to be smaller because the chip allowed for the creation of computer components with varying capabilities.</span>
7 0
3 years ago
As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical
aleksklad [387]

Answer:

Message

Explanation:

  • The Application layer creates a message. The Application layer passes the message to the Presentation layer.
  • The Presentation layer encapsulates the message by adding information to it. Information is usually added only at the beginning of the message (called a header); however, some layers also add material at the end of the message (called a footer)
  • The process of passing the message down and adding layer-specific information continues until the message reaches the Physical layer.
  • At the Physical layer, the message is converted into electrical impulses that represent bits and is transmitted over the physical connection.  
  • The receiving computer captures the bits from the physical connection and re-creates the message in the Physical layer.  
  • The Physical layer converts the message from bits into a Data Link frame and sends the message up to the Data Link layer.
  • The Data Link layer strips its information and sends the message up to the Network layer.
  • This process of deencapsulation is performed until the message reaches the Application layer.
  • When the message reaches the Application layer, the data in the message is sent to the intended software recipient.
5 0
3 years ago
Email is the most common function used in Outlook. Use the drop-down menus to complete the following sentences. By default, the
Olegator [25]
1. Inbox 2. Drafts 3. in the bold font 4. Reading. Hope this helps!
3 0
3 years ago
Read 2 more answers
Give 3 features and uses of <br> Desktop<br> laptop<br> palmtop computer
Ede4ka [16]

Answer:

A Palmtop or hand-held personal computer is small enough to hold in one hand and operate with the other. Also called a handtop, these ultra-small computers may have specialized keyboards or keypads for data entry applications or have small qwerty keyboards.

• Palmtops are also called PDAs, hand-held computers and pocket computers.

• Palmtop or hand-held personal computer, lightweight, small, battery-powered, general-purpose programmable computer. It typically has a miniaturized full-function, typewriter like keyboard for input and a small, full color, liquid-crystal display for output. In addition to an operating system that is compatible with that of a desktop computer, a palmtop will typically contain a word processor, a spreadsheet program, and a calendar and phone book. A variety of other programs can be loaded and executed, and data can usually be transferred to and from a desktop computer. Although some palmtops are like personal digital assistants in that they accept handwritten or touch screen input, they generally differ in that the palmtop has more memory, a keyboard, and a greater variety of available programs.

Explanation:

5 0
3 years ago
Other questions:
  • Define the method object inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids.Sample output for the g
    11·1 answer
  • Which group on the Home Ribbon allows you to add shapes to a PowerPoint slide?
    10·2 answers
  • Describe two ways the ARPANET is different from the internet
    12·1 answer
  • 18. Which type of briefing is delivered to individual resources or crews who are assigned to operational tasks and/or work at or
    14·1 answer
  • 9.6 Code Practice: Question 1
    9·1 answer
  • Data means a group of numbers. <br> a. True<br> b. False
    7·1 answer
  • 3. Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a p
    14·1 answer
  • What frequency band or bands do 802.11g, 802.11a, 802.11n, and 802.11ac use?
    13·1 answer
  • CC stand for.....in the email platform?
    12·2 answers
  • The lost boy gave the correct
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!