1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
4 years ago
15

Consider a movie database in which data is recorded about the movie industry. the data requirements are summarized as follows:

Computers and Technology
1 answer:
Ipatiy [6.2K]4 years ago
3 0
There's incomplete question. But I suggest you to build ER diagram. You can use ERWin as it's the most user friendly program. You can find guides in the program. There're some tips how to build ER-diagram by given requirements.
You might be interested in
Which of the following statements is true according to the code?
mihalych1998 [28]

Answer:

The #intro style applies to all paragraphs.

Explanation:

It is a class

A class applyies to all with that name

5 0
4 years ago
What is the definition of a digital signal?
pashok25 [27]

Answer:

communication of the binary data via the voltage level for each time interval

Explanation:

5 0
3 years ago
What would be the result of running the command chown :root file1.txt
REY [17]

Answer:

b. This would set the group ownership of file1 to root.

Explanation:

Linux allows user to have his own files and regulate the ability of other users to access them. The <em>chown</em> command allows you to use the appropriate utility to change the owner of a file or directory.

The basic command syntax is as follows:

# chown [options] <owner name: owner group name> <file or directory name>

For example, if you want to give a user <em>root</em> opportunity to use the <em>file1.txt</em> file as he wishes, you can use the following command:

# chown root file1.txt

In addition to changing the owner of a file, the group of its owners or both can be changed at the same time. Use a colon to separate the username and user group name (without the space character):

# chown user2:group2 file1.txt

As a result, the user with the name <em>user2</em> will become the owner of the <em>file1.txt</em> and its group will become <em>group2</em>.

In your case omitting username

# chown :root file1.txt

will change owner group only.

8 0
4 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
__________ is the backbone of a computer, connecting all of its components including the central processing unit (CPU) and prima
Tems11 [23]
It’s D. The microprocessor
5 0
3 years ago
Other questions:
  • Which file is used to determine which tty devices the root user is allowed to log in to?
    8·1 answer
  • Angela's ready to get started with her first Smart Display campaign, but her account isn't yet eligible due to not having enough
    11·1 answer
  • A Linux-based OS is called a _____.
    9·1 answer
  • Write two recursive versions of the function minInArray. The function will be given a sequence of elements and should return the
    8·1 answer
  • Which are characteristics of a video with a higher
    13·1 answer
  • Can someone please help me with 6.8 Code Practice adhesive.
    14·2 answers
  • Give five examples of physical networking.
    15·1 answer
  • Select the correct answer.
    6·1 answer
  • Your ISP connects to the core routers of the Internet via a O backbone O satellite O cable mode Ospine​
    9·1 answer
  • Which of the following statements describes the general idea of an assistive media​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!