1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natka813 [3]
3 years ago
15

A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as oth

ers because it is not _____.
Computers and Technology
2 answers:
bija089 [108]3 years ago
4 0
<span>A certain database has numerous tables, but they do not share any fields in common. this database will not be as powerful as others because it is not relational.  In </span><span>a relational database the data elements are dividing the data elements into related tables. Once ready to start working with the data, one can rely on relationships between the tables to pull the data together in meaningful ways.</span>
ivolga24 [154]3 years ago
4 0

relational Is answer on APEX

You might be interested in
Lonic compounds are also known as <br> a. salts <br> b. valence <br> c.organic <br> d.elements
shutvik [7]
I'm not quite sure but it maybe b
6 0
3 years ago
Read 2 more answers
Have y’all enjoyed The new hero floryn from Mobile legends
Angelina_Jolie [31]

Answer:

yo! but I'm a ex-mobile legends

5 0
2 years ago
Summarize who you believe cyber criminals are, and why?
sergij07 [2.7K]

Answer:

 The cyber criminals are the people that are engaged with getting the data in an unapproved way and furthermore mischief to the association henceforth are considered as cyber criminals.

Cyber criminals are people or groups of individuals who use innovation to committed the malicious exercises on computerized frameworks or systems with the aim of taking the organization data or individual information and producing benefit.

There are many types of cyber criminals that are:

  • Internet stalkers
  • Cyber terrorist
  • Identity thieves

5 0
3 years ago
How many total numbers can be represented with an 8-bit binary (base-2) system?
ddd [48]

Answer:

256

Explanation:

4 0
3 years ago
In discussing inventory, Helena mentions that bikinis for sale on the website are not always in stock. Say customer feedback ind
alekssr [168]

Answer:

decide that when online customers and retail stores order bikinis, they will never have to wait more than two weeks for the order to arrive.

Explanation:

Based on the information provided within the question it can be said that in this scenario the best action that Helena can take is to decide that when online customers and retail stores order bikinis, they will never have to wait more than two weeks for the order to arrive. Otherwise she will begin to lose customers constantly by not having stock or shipping the product in time. These losses will continue to amass and may eventually ruin her business.

6 0
3 years ago
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • After several incidents in __________ the company’s computer systems were not ready to support new products, the CEO established
    12·1 answer
  • Rewrite this method so that it avoids the use of a return statement:
    15·1 answer
  • Consider a movie database in which data is recorded about the movie industry. the data requirements are summarized as follows:
    15·1 answer
  • For the preceding simple implementation, this execution order would be nonideal for the input matrix; however, applying a loop i
    6·1 answer
  • Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks-&gt;
    10·1 answer
  • Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, the
    15·1 answer
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • What are the methods used in research methodology?
    12·1 answer
  • Write the importance of program in computer​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!