1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
1 year ago
5

5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use

the normalization technique and form the 3nf tables (25 points)*write out the create table command in sql for creating the database you have designed, make sure to use the right data types, constraints, and constraint references. (20 points) *write one sql insert into values ( ); command for each table in your database
Computers and Technology
1 answer:
Marina86 [1]1 year ago
6 0

Indicate the values to be added as well as the column names: INSERT INTO table_name (column1, column2, column3, ...).

<h3>What is Database?</h3>

A database in computing is a structured collection of data that is electronically accessible and stored.

Large databases are housed on computer clusters or cloud storage, whilst small databases can be stored on a file system.

Data modeling, effective data representation and storage, query languages, security and privacy of sensitive data, and distributed computing challenges, such as providing concurrent access and fault tolerance, are all part of the design of databases.

In order to collect and process data, a database management system (DBMS) communicates with applications, end users, and the database itself.

The primary tools offered to manage the database are also included in the DBMS software. The combined database, database management system, and related applications are referred to as.

Hence, Indicate the values to be added as well as the column names: INSERT INTO table_name (column1, column2, column3, ...).

learn more about database click here:

brainly.com/question/518894

#SPJ4

You might be interested in
What is the software that manages and controls the activities and resources of the computer? O The CPU The OS The ALU The GUI D
Elodia [21]

Answer:

the software that manages and controls the activities and resources of the computer is OS

Explanation:

the software that manages and controls the activities and resources of the computer is OS

because here we know that CPU is hardware

and ALU is a digital circuit that is use to perform arithmetic and logic operations

and

GUI or Graphical User Interface controls the graphical interface of the applications

so here correct option is OS that is the software that manages and controls the activities and resources of the computer

7 0
3 years ago
What are the factors affecting the purchasing decision for dbms software?
djverab [1.8K]
T<span>he factors affecting the purchasing decision for dbms software are : 
</span><span>a) Cost
b) DBMS features and tools
c) Underlying model
d) Portability
e) DBMS hardware requirements</span>
3 0
3 years ago
Read 2 more answers
Need help asap please​
Fofino [41]
Because you can make it to where they cannot find or see or look or talk or anything on your profile it can cut off Comunication from the person. It can also protect your safety!
6 0
2 years ago
How to send an email to multiple recipients individually.
zheka24 [161]

Answer:

The BCC method

Explanation:

4 0
2 years ago
A low-level language has a low level of ___________ because it includes commands specific to a particular cpu or microprocessor
Studentka2010 [4]
Command Specifics to a cpu or a microprocessor it is code <span />
7 0
3 years ago
Other questions:
  • After several incidents in __________ the company’s computer systems were not ready to support new products, the CEO established
    12·1 answer
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • When a speaker is finished talking, you should allow for _____.
    14·2 answers
  • Please explain why an operating system makes a great attack target.​
    9·1 answer
  • Write a method for the Customer class that that will return a string representing a bill notice when passed a double value repre
    14·1 answer
  • Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.
    7·1 answer
  • If we compare the push function of the stack with the insertFirst function for general lists, we see that the algorithms to impl
    9·1 answer
  • Write an algorithm that gets as input your current credit card balance, the total dollar amount of new purchases, and the total
    8·1 answer
  • A method that determines if a list is empty in a consistently written linked list class that uses a reference first to point to
    13·2 answers
  • How will you maintain electrical tools and equipment?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!