1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
3 years ago
5

A one-to-many binary relationship allows an occurrence of the entity type on the "one side" of the relationship to be associated

with _____. a a single occurrence of the entity type on the "many side" of the relationship b multiple occurrences of the entity type on the "one side" of the relationship c multiple occurrences of the same entity type d multiple occurrences of the entity type on the "many side" of the relationship
Computers and Technology
1 answer:
krok68 [10]3 years ago
5 0

Answer: C.

multiple occurrences of the same entity type

Explanation:

In a one-to-many relationship, one record in a table can be associated with one or more records in another table. For example, each customer can have many sales orders. ... The foreign key field in the Orders table, Customer ID, is designed to allow multiple instances of the same value. A Binary Relationship is a relationship between two different Entities i.e. it is a relationship of role group of one entity with the role group of another entity.

You might be interested in
What are all the physical components called?
Alecsey [184]

Physical Components to a computer are called hardware.

3 0
4 years ago
If a computer reboots itself on its own the computer might have a(n)
MissTica

Answer:

D. Software Problem

Explanation:

It could be that the software is bootlooping which will power on and off until its fixed.

4 0
3 years ago
Renting provides _________ flexibility but can lead to _________ costs in the long-term.
docker41 [41]
Renting provides greater flexibility but can lead to higher costs in the long term.
3 0
4 years ago
Read 2 more answers
Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I
Naily [24]

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

8 0
3 years ago
Write a note on secondary storage​
slega [8]

Answer:  Storage devices are non-volatile devices. That means that when the power is removed from them, for example, when you switch your computer off, they retain their contents (unlike RAM, which is volatile – it loses its contents). You can then retrieve the contents next time you switch your computer on. Storage devices can be used to hold operating systems, applications and files, amongst other types of software. They are simply big suitcases – used only for storage. We have already seen that when you want to use an application kept on a storage device, it has to be moved to RAM before you can start using it. This applies to the operating system, your files and any other category of software. For this reason, RAM is sometimes known as Primary Memory whereas storage devices are often referred to as Secondary Storage devices.

8 0
3 years ago
Other questions:
  • A slightly tapered thread is characteristic of a _______ tap.
    15·1 answer
  • There are several methods of updating information and data on a webserver. We must consider who performs those updates upfront w
    9·2 answers
  • .Write a C++ program that displays your name and address (if you value your privacy, a fictitious name and address).
    9·1 answer
  • Why should you stay out of the open space to the right of a semi tractor trailer?
    7·2 answers
  • For an machine using 2-dimensional even parity for error detection/correction, and the following received bytes, where is the er
    9·1 answer
  • ____ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digita
    12·1 answer
  • Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use? JavaScript H
    15·2 answers
  • A good way to assess your CPU usage is to:_______.
    13·1 answer
  • What are common considerations businesses need to make before purchasing new computers? Check all of the boxes that apply.
    6·1 answer
  • Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!