1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
9

Nicole wants to create a database to collect information about videos in her video rental store. She would like to use the datab

ase to look up movies by rating, actors, producer, and title. She would also like to retrieve the movies that are in stock. What fields should she have in her database? title, rating, actor, and producer rating, director, and actor title, rating, actor 1, actor 2, actor 2, actor 4, producer, and in stock product number, price, and rating
Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
3 0

Answer:

All the field which she has mention has to created by Nichole in her database.

Explanation:

The following fields have to be created in the database

title, rating, actor, and producer rating, director, and actor title, rating, actor 1, actor 2, actor 2, actor 4, producer, and in the stock product number, price, and rating

 

And additional field also has to create movie-length also as integer field which should carry the length of the movie  

Date of release and movie certificate also can be captured so the search engine will be very useful

You might be interested in
Select the correct answer from each drop-down menu.
Gelneren [198K]

Answer:

Maybe computer engineering and marketing skills

4 0
3 years ago
In which of the following ways can using test-taking tips help you?
bogdanovich [222]
In my opinion i think it is A
3 0
3 years ago
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d
nadezda [96]

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

3 0
1 year ago
Which part of a computer is responsible for executing the software programs?
mamaluj [8]

Answer:

c. CPU

Explanation:

7 0
3 years ago
In the scenario below, select the evaluation factor that is most important.
jasenka [17]

Answer:

A. Connectivity

Explanation:

I just answered this question.

4 0
2 years ago
Other questions:
  • A private local network, accessible only to an organization's staff, is known as an:
    12·2 answers
  • I don’t know technically
    9·2 answers
  • Which motherboard slot has direct access to the north bridge?
    7·1 answer
  • What is constructive criticism?
    5·1 answer
  • Briefly describe the client/server model.
    8·1 answer
  • Design a hierarchy c hart or flowchart for a program that calculates the current balance in a savin gs account. The program must
    8·1 answer
  • I get such an error when I turn on the computer, how can I fix it?
    7·1 answer
  • Electronic mail is a
    9·1 answer
  • Please what do you guys think about this ?
    10·2 answers
  • What is the difference between a crosstab query and a subquery?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!