1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DiKsa [7]
3 years ago
6

Build a state diagram for the “book” based upon the following information of the library.

Computers and Technology
1 answer:
frez [133]3 years ago
6 0

Answer:

Please check attachment.

Explanation:

Please check attachment. Book can be borrowed or not borrowed if not available. If not available book, request is registered and book is purchased. If book is bought then book can be borrowed. If request is cancelled then no problem or else book is assigned to the seeker(also he/she is informed) on availability. If book is available and assigned, then either book is returned within the deadline or returned after with fine or order is cancelled as its not needed anymore.

You might be interested in
PLEASE HELP!!! NO LINKS!! I'LL GIVE BRAINLIEST!!
Tanya [424]

Answer:

Queries.

Explanation:

Queries can perform many different functions in a database. Their most common function is to retrieve specific data from the tables. The data you want to see is usually spread across several tables, and queries allow you to view it in a single datasheet.

3 0
3 years ago
Read 2 more answers
Supply is a powerful force in a free market.
Greeley [361]

Answer:

Input prices, number of sellers, technology, natural and social factors, and expectations.

Explanation:

Input in prices: When the prices go up supply will fall because lower quantities will be demanded.

Number of sellers: When the number of sellers are more, it will affect sales which is supply.

Technology: This helps in making supply to be properly done. Latest technology such as waybill, email, uber drivers, dispatch via logistics companies, shipment, air cargo carriers and a lot more.

5 0
4 years ago
Read 2 more answers
Following rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as _______.
vampirchik [111]

In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

<h3>What is IPv6?</h3>

The IPv6 address is known to be a form of Internet Layer protocol made for packet-switched internetworking and it helps to give  an end-to-end datagram movement in course of multiple IP networks.

Note that, In regards to the rules of compaction, the IPv6 address 2001:0db8:0000:0000:0000:ff00:0012:3456 could also be written as 2001:db8::ff00:12:3456.

Learn more aboutIPv6 address   from

brainly.com/question/5296366

#SPJ1

4 0
2 years ago
Write a short note on Ms - Excel...​..
sweet-ann [11.9K]

Answer:

Microsoft Excel is a spreadsheet program. It provides a grid interface to organize the various information. You can use Excel to create and format workbooks in order to analyse the data. Specifically, you can use Excel to track data, build models for analysing data, write formulas to perform calculations on that data, pivot the data in various ways, and present data in a variety of professional looking charts. Excel is used widely in financial activity. It has the ability to create new spreadsheets where users can define custom formulas for the calculation. Excel is also used widely for common information organization and tracking like a list of sales leads, project status reports, contact lists, and invoicing. Excel is also useful tool for scientific and statistical analysis with large data sets.

3 0
3 years ago
___________ are the constant values that are used in a program. ​
77julia77 [94]

Answer: Data

Explanation:

3 0
3 years ago
Other questions:
  • Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
    5·2 answers
  • What device copies system files
    14·1 answer
  • A device in electricity that is analogous to a restriction in a water pipe is:
    11·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • You accidentally moved your task bar from the bottom of the screen to the left side. You would like to
    14·2 answers
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
  • Instructions
    15·1 answer
  • Any movie/show suggestions??
    7·2 answers
  • Where can you get information on receiving financial help?
    12·1 answer
  • When an AC voltage is being measured
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!