1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
8

Can someone help me on drawing ER and Use case diagram on following scenarios. ASAP!!! Please :(

Computers and Technology
1 answer:
GalinKa [24]3 years ago
4 0

Answer:

The ER Diagram is in the attachment. And I an including the membership details in the use case:

Applicants: Coach will ask for iD.

if the application is not registered, coach sends to registration department.

Applicants registers-->> shows registration ID-->> goes to account section

Submits the fee->> goes to coach again-->>coach asks for fee sjip-->> On yes-->> entrance allowed else-->> sent to account section

Applicants apply for course-->>if prerequisite is met, registration allowed

else-->>registration denied

Note: If registration is allowed the applicant is sent to account section and

Also note:

First check, then registration, then course prerequisite check,then account->entrance

If registered->direct entry.

Explanation:

The answer is self explanatory.

You might be interested in
Surprisingly, many of us may be unknowing victims of botnets. Because of the rising sophistication of botnet schemes, your compu
Virty [35]

Answer:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

C. All the part of a security incident should be logged.

Explanation:

a. Simple rules

1. Upgrade your operating system

2. Upgrade your softwares regularly

3. Upgrade your browser when new additions are available

4. Change your password very often

b. Suspensious signs

1. The operating system and programs take a longer while to start up.

2. It shows lack of storage space despite having space

3. The PC crashes regularly

4. If the sent mails are received as spam

5. The hard disk is working excessively while no programs are currently running

Explanation:

C. All the part of a security incident should be logged.

7 0
3 years ago
Briefly explain the importance of doing backup in systems administration and explain in detail any three methods for performing
Dmitry_Shevchenko [17]

Answer:

Importance of backup in system administration:

Backups are crucial in system administrations for preserving continuity and protecting against specific types of hardware failures, service interruptions, and human mistakes. To aid a company in recovering from an unexpected catastrophe, backup copies make it possible to restore data to a previous point in time. To safeguard against primary data loss or corruption, it is essential to save a copies of data on a different media. When a system administrator create a backup, he makes a copy of the data that you can restore if your main data is lost. These errors may be the consequence of faulty hardware or software, corrupted data, or a human error like a targeted attack or an unintentional deletion. System backup and recovery is therefore a crucial skill for system administrators as well as the companies they work for.

Three methods for performing backup:

  1. Disk image: A efficient method to back up not only the files and directories but also everything else on the system is by creating a disk image. If a user have a disk image, the user can restore everything, including the operating system, applications, data, and more, so the user won't have to worry about any difficulties. Placing the  disk image-containing DVD into the DVD-ROM to restore the backup. Additionally, just attach an external HDD to the computer if the user have a disk image that they made.
  2. External hard drive: The most common backup method is to use an external hard drive or even a USB flash drive. An HDD can be easily, quickly, and affordably backed up. It is effective since consumers may carry their portable backup with them wherever they go.
  3. Cloud backup: Cloud backup or Online backup has been around for a while, but not many people really utilize it. But the greatest backup technique by far is cloud backup. The user does not have to worry about hardware problems because their files are saved in the cloud and can be accessed from anywhere because the backups are automatically produced and everything is synchronized. It is one of the greatest methods to backup, especially when you consider that the contents are encrypted and stored securely.

6 0
2 years ago
Reasons why construct is a great beginner game engine
Vlada [557]

Answer:

Construct 2 is a very intuitive drag and drop for creating 2D games. The learning curve is super fast, and the interface looks a lot like Microsoft products, so it makes it an ideal tool for PC users who have never looked at a game engine before

Explanation:

8 0
3 years ago
Describe two features of a digital audio workstation that can be used to enhance a podcast
maks197457 [2]

The two features of a digital audio workstation that can be used to enhance a podcast are DAW is truly vital in case you need expert sounding song. Or in case you need an unprofessional-sounding song.

<h3>What are the blessings of the use of a virtual audio workstation?</h3>

Digital audio workstations have revolutionized the manner song and audio recordings are made. With surely limitless tune counts, lightning-quick, specific modifying capabilities, plugins, and more, all of us can bounce in and begin recording and mixing.

  1. Regardless of configuration, cutting-edge DAWs have a relevant interface that lets in the consumer to adjust and blend more than one recordings and track right into a very last produced piece.
  2. A computer-primarily based totally DAW has a few primary components: a computer, a legitimate card or audio interface, a virtual audio modifying software, and an audio or midi source.

Read more about the workstation :

brainly.com/question/24540334

#SPJ1

5 0
2 years ago
Which of these file formats would you choose if you had to create a very small and compact raster image for a website?
NikAS [45]

Answer:

Not (png)

sdfgsershntynmjeg

7 0
3 years ago
Other questions:
  • The faster alcohol is consumed, the faster it reaches the __________.
    9·2 answers
  • How do online note-taking tools support students’ academic goals? Check all that apply.
    9·2 answers
  • Select one of the following strategies: active listening, sandwich technique, constructive feedback. in 2-5 paragraphs, define a
    11·1 answer
  • Given a one dimensional array arr, what is the correct way ofgetting the number of elements in arr
    15·1 answer
  • "Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required f
    6·1 answer
  • A computer supply company is located in a building with three wireless networks.
    10·1 answer
  • Can you awnser this question
    15·1 answer
  • Guidewords for the word “serpent” may be
    8·2 answers
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!