1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
15

What are the possible sources of the information that defines the functional dependencies that hold among the attributes of a re

lation schema? Discuss two possible sources. Explain your answer.
Computers and Technology
1 answer:
valkas [14]3 years ago
3 0

A functional dependency describes a relationship between the attributes of an entity such that the value of one attribute is dependent on the value of some other attribute and is very well affected by it.

There can be various sources of information that define functional dependency. For instance, an attribute age can define the functional dependency with the attribute ID. One cannot include the voter ID if they are not above 18 years of age.

Similarly, the attribute date of joining can define the functional dependency with the attribute experience, as the experience in a particular organization can be calculated by subtracting the joining date fro the current date.

You might be interested in
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
3 years ago
Ano ang word processor at electronic spreadsheet​
AveGali [126]

Answer:

excel

Explanation:

3 0
3 years ago
Read 2 more answers
A loop that will output only the names that come before "Thor" in the alphabet from the names list.
matrenka [14]

names = ["Kevin", "Joe", "Thor", "Adam", "Zoe"]

names.sort()

for x in names:

   if x == "Thor":

       break

   else:

       print(x)

I made up my own names for the sake of testing my code. I wrote my code in python 3.8. I hope this helps.

3 0
3 years ago
How does soil lose its value? A.When the top soil is stripped by wind or water B.When the bedrock is damaged by animals C.When w
Ratling [72]

A) when the soil is stripped by wind or water.. when this happens the soil can be rid of it's nutrients and fertility.. The other options are actually kind of helpful, when the bedrock is damaged by animals (unless you've already set up and everything) it actually helps to till the soil, the water will help to moisten it and make it better or providing life (depending upon the amount of water tht is) and burrowing animals can consist of worms to groundhogs.. depending upon the plans for said soil, It could be helpful with the worms, but the plans could be altered by the groundhog.. but referring to the original question, It definitely  loses it's value when it's stripped by wind and water. 
8 0
3 years ago
Jessica has pinned her favorite applications as icons on her desktop. She always clicks on these icons to work on them. Which us
Hatshy [7]

Answer:

Graphical User Interface (GUI)

Explanation:

Graphical User Interface clicking on various icons to perform a certain functionality. GUI is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, instead of text-based user interfaces or command line interface where you would have to type to run the program rather than just click it.

7 0
3 years ago
Other questions:
  • How does microchip work
    12·1 answer
  • Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability o
    6·1 answer
  • A recursive method without a special terminating case would _________. Hint: Self Check 13.3 had infinite number of isLucky() me
    5·1 answer
  • A system that provides monthly production figures for a manager at manufacturing facility is considered a(n) __________. a. ente
    7·1 answer
  • Using PowerPoint or Impressed guarantees that your presentation will do which of the following?
    6·1 answer
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • Two strategies for keeping your files in sync
    6·1 answer
  • I NEED HELP, DO ASAP <br> Why do you have to adjust toys for different ages?
    11·2 answers
  • How do i delete cookies on a chromebook?
    8·1 answer
  • Examples of 15 viruses in computer
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!