1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
2 years ago
10

The master system database stores a database template that is used as a blueprint when creating a new user database.

Computers and Technology
1 answer:
Novay_Z [31]2 years ago
6 0
<span>An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a</span>
You might be interested in
In a social networking site your personal information is listed under your inbox. home. status. profile.
Sladkaya [172]
Profile let's go with profile hope this helps
3 0
3 years ago
Write a program that accepts a positive integer N as command-line argument, and outputs True if N is the square of some integer,
Ann [662]

Answer:

In Python:

N = int(input("Positive integer: "))

if N > 0:

   flag = False

   for i in range(1,N+1):

       if i * i == N:

           flag = True

           break

   print(str(flag))

else:

   print("Positive integer only")

   

Explanation:

N = int(input("Positive integer: "))

If the number is positive

if N > 0:

This initializes a boolean variable to false

   flag = False

This iterates from 1 to the input integer

   for i in range(1,N+1):

This checks if th number is a square of some integer

       if i * i == N:

If yes, flag is set to true

           flag = True

The loop is exited

           break

This prints either true or false, depending on the result of the loop

   print(str(flag))

If otherwise, that the number is not positive

<em>else:</em>

<em>    print("Positive integer only")</em>

3 0
3 years ago
All phones must have a way of making and then terminating a connection to the phone network; however the exact procedure for doi
Aliun [14]

Answer:

The code will be a java-script code

Explanation:

public abstract class Phone{

    private String phoneNumber ;

    public Phone  (String thePhoneNumber) {

        phoneNumber = thePhoneNumber ;

    }

    public  String getPhoneNumber ( ) {

        return phoneNumber ;

    }

public String toString (  ) {

    phoneNumber = "# (" + phoneNumber + ") " ;

    return phoneNumber ;

   }

public abstract boolean createConnection (Network status) ;

public abstract void closeConnection(  ) ;

}

6 0
3 years ago
A large computer repair company with several branches around Texas, TexTech Inc. (TTi), is looking to expand their business into
Aleks04 [339]

Answer:

hecks

Explanation:

nah

6 0
3 years ago
write a C++ program that requires the user to enter two-digit positive and negative integers . The program counts the number of
ValentinkaMS [17]

Answer:

Use GitHub it helps a lot

Explanation:

4 0
2 years ago
Other questions:
  • It is not possible to convert a numbered list to a bulleted list in Word 2007. T or F
    13·1 answer
  • Most browsers allow you to maintain your most frequently visited websites. what is this called? Special place holder, secret lis
    6·2 answers
  • Where is line-of-sight Internet common?<br> In space<br> Outdoors<br> Inside<br> In businesses
    10·1 answer
  • If you need seamless access to the OS, ________ is better.
    8·1 answer
  • T F Changes to a function parameter always affect the original argument as well.
    15·1 answer
  • Danica is creating a flyer for her cookies that she will sell during her school fair. She wants to add a registered
    7·1 answer
  • You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are ev
    12·1 answer
  • Why would you browse by entering a URL rather than use a link in a Web page
    15·1 answer
  • Which option ensures that items in a text box or table cell will be in the absolute center of that element?
    12·1 answer
  • What are three ways of verifying legitimate right of access to a computer system?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!