1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
4 years ago
14

One of the attributes in a table in your database depends on another attribute for its meaning. What type of dependency has been

formed?
Computers and Technology
1 answer:
posledela4 years ago
5 0
We call it functional dependencies.

A functional dependency which is also commonly known as a database dependency occurs in a database when info stored in the same database determines other information stored in the same table. Knowing the value of a set of attribute is enough to tell you the value of another set of attributes.



You might be interested in
Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
il63 [147K]

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

7 0
3 years ago
What is CPU<br>and it's functions<br>​
BartSMP [9]

Answer:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer

5 0
3 years ago
Read 2 more answers
The system log daemon, rsyslogd, creates a socket for other system processes to write to. what is the path to this socket?
Vlada [557]

If the system log daemon, rsyslogd, creates a socket, the path to this socket is known to be /dev/log.

<h3>What is the system log daemon?</h3>

The syslog daemon is known to be a kind of a server process that is known to often gives or provides a form of message logging tools that is made for application and system processes.

Note that the syslog daemon is said to be one that begins by the Internet Daemon and it is also one that tend to receives messages on well-known port such as  514.

Note that The syslog daemon must be on before any application program and as such, If the system log daemon, rsyslogd, creates a socket, the path to this socket is known to be /dev/log.

See full question below

The System Log Daemon, rsyslogd, creates a socket for other system processes to write to. What is the path to this socket?

Select one:

a. /etc/rsyslog.socket

b. /var/log.sock

c. /tmp/log

d. /dev/log

Learn more about system log from

brainly.com/question/25594630

#SPJ1

6 0
2 years ago
What is the purpose of the Revisions pane in a presentation?
lana [24]
First option


Sorry if I’m wrong
7 0
3 years ago
Read 2 more answers
grow a sentence frame a small and simple sentence. then expand it. Expand this sentence -I am a gril​
AlekseyPX

Answer:

I am a young lady.

Explanation:

simply sentence or expand more:

  • I am a young lady in my teens. ​
  • I am a young woman in her twenties. ​
  • I am a twenty-year-old lady who is just starting off in life. ​
  • I am a twenty-year-old woman who is just getting her feet wet in the world. ​
6 0
3 years ago
Read 2 more answers
Other questions:
  • 2. Which of the following fonts is most legible for a block of text? What font size and color would you choose if you were writi
    11·2 answers
  • Define data, explain its three forms, and the general steps a computer performs related to data.
    7·1 answer
  • With the evolution of RFID instead of UPC, how will this capability make the production grow and improve inventory and security?
    9·1 answer
  • Television is a technological development that occurred during the what age?
    5·1 answer
  • Which statement best describes antivirus software?
    13·1 answer
  • 8.9 Code Practice
    11·2 answers
  • What is the internal working of the computer called?
    9·1 answer
  • It is better to know the main components of all computer programming languages than to memorize the rules for all of the languag
    14·2 answers
  • How do i get around a school related block
    13·2 answers
  • The value of a variable can change multiple times during the execution of a computer program.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!