1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka-Z-Leto [24]
3 years ago
12

If an M:N relationship is mandatory on both sides, and if both relations resulting from the entities involved in the relationshi

p each have 3 records, then the resulting bridge relation cannot have less than ________ records?
0

1

3

9
Computers and Technology
1 answer:
vivado [14]3 years ago
4 0

Answer:

0

Explanation:

In the problem above, the relationship that exists between M and N is discovered to be on each side of the system. Furthermore, it was stated that the outcome of the relationship also has approximately 3 records. This shows that there is no record for the bridge that is formed as a result of the relationship.

You might be interested in
Software for creating animations
Lady_Fox [76]
There´s PowToon, GoAnimate, ToonBoom. There are more, but these are the ones that I know about. I hope that I helped. Have a good day!

8 0
3 years ago
Read 2 more answers
Universal Containers requires that all users add at least one Product Option from the Maintenance Feature to a bundle.
zmey [24]

Answer

Set the Max Options for “Maintenance” to be one. Set the Min Options to one & Max Options to two for “Support”.

Explanation:

the Admin set up these requirements for the user using Set the Max Options for “Maintenance” to be one. Set the Min Options to one & Max Options to two for “Support”. Since users must select at least one and no more than two Product Options from the Support Feature and Product Option from the Maintenance Feature to a bundle.

6 0
3 years ago
Nowadays, most online discussion boards are on Web-based forums that provide a variety of user-friendly tools to create and post
Katyanochek1 [597]

Answer:

The correct answer to the following question is option e.) Usenet.

Explanation:

Usenet - it  is a collection of the user-submitted messages or notes on the various subject that posted to the servers on the worldwide network. Each of the subject collection of notes is known as newsgroups. There are thousands of the newsgroups which is possible for us to form the new one.

It works like the decentralized computer network which allows us to download our required files. We can also download and access the binary files along with the text post.

5 0
3 years ago
Explain how data structures and algorithms are useful to the use of computer in data management<br>​
laiz [17]

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

5 0
3 years ago
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
2 years ago
Other questions:
  • That is Entrepreneur ? ?<br>​
    8·1 answer
  • Which statement accurately describes DTP programs?
    11·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • A______ is a graphical representation of numeric data.
    8·1 answer
  • Which statement is true of Web-based social media?
    12·1 answer
  • Examine the following algorithm.
    9·1 answer
  • A database administrator (DBA) must have a clear understanding of the fundamental business of an organization, be proficient in
    12·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • What explains the discrepancy between the number of bytes you can
    13·1 answer
  • A good machine should have the mechanical advantage of......?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!