1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
5

A one-to-many binary relationship allows an occurrence of the entity type on the "one side" of the relationship to be associated

with _____. a a single occurrence of the entity type on the "many side" of the relationship b multiple occurrences of the entity type on the "one side" of the relationship c multiple occurrences of the same entity type d multiple occurrences of the entity type on the "many side" of the relationship
Computers and Technology
1 answer:
krok68 [10]3 years ago
5 0

Answer: C.

multiple occurrences of the same entity type

Explanation:

In a one-to-many relationship, one record in a table can be associated with one or more records in another table. For example, each customer can have many sales orders. ... The foreign key field in the Orders table, Customer ID, is designed to allow multiple instances of the same value. A Binary Relationship is a relationship between two different Entities i.e. it is a relationship of role group of one entity with the role group of another entity.

You might be interested in
What can you look for on a website to indicate that the information it presents is reliable?
dybincka [34]

There are several things you can look for on a website to help you figure out if the information is reliable. The first thing you should evaluate is the audience that the website is intended for. Is it intended for academics? School children? The general public?


The next thing you should look at is the author of the website. Is the author identified? Is the author an expert in their field? Can you establish the author's credibility? Is the author affiliated to an academic institution or credible organisation?


Look at the accuracy of the website. Check for spelling errors, proper grammar, and well-written text. Are there any sources cited? Are those sources credible?


You should also check to see when the information was published. Is the information up to date? Are all of the links up to date and functioning?


There is one last thing you can look at, and this is the domain of the website. Domains like .edu and .gov are more credible than .com or .net domains.

5 0
3 years ago
3.3 Code Practice: Question 1
Bezzdna [24]

Answer:

day=int(input(“Enter today’s day numerically: ”))

if(day ==15 or day ==30):

print(“It’s payday!”)

if(day !=15 and day !=30):

print(“Sorry, not a payday.”)

Explanation:Good luck!

6 0
3 years ago
Describe the purpose of working directory and how it can be speed or slow file access
Cloud [144]

Explanation:

The working directory is just a file path on your computer that sets the default location of any files you read. If you want to read a file 'file.txt'.

6 0
1 year ago
A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a
kap26 [50]

Answer:

A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a unique username and password before being able to associate with the wireless access points. Which of the following wireless features would be the MOST appropriate to achieve this objective?

Option A is the correct answer -  WPA2 PSK.

Explanation:

Data is the most essential asset for obtaining knowledge and information. Therefore, it has to be protected from various threats. However, the wireless network provides the option of sharing data without wires, but it is flying in the air. Thus, to secure it, we need to secure it with the right tools.

Option A: WI-FI Protected Access Pre-shared-Key (WPA2 PSK) is the best protection tool because it has 2 modes-PSK and Enterprise mode.

7 0
3 years ago
Read 2 more answers
A router receives a packet and determines the outbound link for the packet. When the packet arrives, 2/3 of one other packet is
vlada-n [284]

Answer:

Queuing Delay is 0.08 seconds

Explanation:

The answer follows a formula that is relatively easy to use and is detailed below.

Queuing Delay = [(L - x) + (nL)] / R

where,

L is packet length given as 3,000 bytes

x is the currently transmitted packet given as 2/3 * 3,000 = 2,000

n is the number of packets waiting in the Que given as 5

R is the rate of transmission given as 4 Mbps (4 * 10^6 Bps)

We can simply plug in the above information in the equation for computing Queuing Delay.

Lets take the numerator first which would be [(3000 - 2000) + (5 * 3000)]

The numerator would be 16000 bytes. These are being transmitted at 4Mbps. So, 16000*4*5 = 320,000 "bits"

Queuing Delay= 320,000/4000000

Queuing Delay = 0.08 seconds.

As we can see, the formula is quite intuitive to use. You are simply taking the number of packets to be transmitting, incorporating the partially transmitted packet, multiplying by the number of packets and the rate of transmission and then dividing the product by the rate of transmission to compute what the delay in the Que is.

6 0
3 years ago
Other questions:
  • What are two types of organizational structures designed to help an organization achieve its goals and objectives?
    11·2 answers
  • The create_python_script function creates a new python script in the current working directory, adds the line of comments to it
    9·1 answer
  • Why are application programs stored in main memory​
    11·1 answer
  • Why is it difficult to enforce laws against intellectual theft?
    9·1 answer
  • The slide layout has placeholders for text, charts, and tables. true or false.
    6·2 answers
  • Write a qbasic program to display integer numbers 1 to 100 using the for next loop<br>​
    9·1 answer
  • Please answer it’s timed
    11·1 answer
  • Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Te
    10·1 answer
  • Describe a new career in computer science that may be created in the future
    11·1 answer
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!