1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
3 years ago
14

Contrast the following terms (provide examples): Partial dependency; transitive dependency

Computers and Technology
1 answer:
kiruha [24]3 years ago
5 0

Answer:

Explanation:

Transitive dependency

In this case, we have three fields, where field 2 depends on field 1, and field three depends on field 2.

For example:

Date of birth --> age --> vote

Partial dependency

It is a partial functional dependency if the removal of any attribute Y from X, and the dependency always is valid

For example:

Course and student these tables have a partial dependency, but if we have the field registration date, this date will depend on the course and student completely, we must create another table with the field registration date to remove this complete dependency.

If we remove or update the table registration date, neither course nor student must not change.

You might be interested in
Megan says she never needs to look at the Transport Layer when she is searching for what went wrong with the network she support
lara31 [8.8K]

I'd say D: Wrong, because transporting information is what a network does, and the Transport Layer is at the heart of that layer.

Transport layer is truly at the heart of the OSI model. Its main function is to transfer application data from the source to destination. This layer provides a reliable end-to-end communication service and transfers data for the user layers above it, as well as shielding the rest of the layers below from details like message error and flow control functions. If packets get destroyed or lost during transmission, it is in the best interest of Megan to check the transport layer. Transport layer ensures that whenever something like this happens, packets must be re-transmitted.

3 0
3 years ago
Read 2 more answers
Write a program that prompts the user to enter a month (1-12) and year, then displays the number of days in the month. For examp
uysha [10]

Answer:

In Java

import java.util.Scanner;

public class Main {

public static void main(String[] args) {

    int mnth, yr;

 Scanner input = new Scanner(System.in);

 System.out.print("Month: ");  mnth = input.nextInt();

 System.out.print("Year: ");  yr = input.nextInt();

 boolean lpYear = (yr % 4 == 0 && yr % 100 != 0) || (yr % 400 == 0);

 if(mnth == 1 || mnth == 3 || mnth == 5 || mnth== 7 || mnth == 8 || mnth == 10 || mnth == 12){

     System.out.print("31 days");  }

 else if(mnth == 2){

     System.out.print(((lpYear) ? "29 days" : "28 days"));  }

else if(mnth == 9 || mnth == 6 || mnth == 4 || mnth== 11){

     System.out.print("30 days");  }

 else{      System.out.print("Invalid");  }

}

}

Explanation:

See attachment for complete program where comments were used as explanation.

Download txt
3 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Content controls cannot be removed, only edited. Please select the best answer from the choices provided
Anton [14]
 False is your answer
5 0
3 years ago
Given a following C program, where M and N are constant declared with #define long P[M][N]; long Q[N][M]; long sum_element(long
sladkih [1.3K]

Answer:

Check the explanation

Explanation:

The first, second and third instruction together set %rdx = 3*%rdi + %rsi. The fourth and fifth instruction set %rdi = %rdi+9*%rsi.

Now %rdi is used to address Q, while %rdx is used to address P. Note that P is addressed by column and then by row. Hence M = 3 . Also Q is addressed by row and then column, hence N = 9 .

3 0
4 years ago
Other questions:
  • The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of d
    7·2 answers
  • How long before a speech should you begin practicing?
    10·2 answers
  • What is the efficiency (Big O Notation) of quicksort algorithm?
    15·1 answer
  • In excel, the applied theme has a set of complimentary ________, which are defined sets of formatting characteristics, such as f
    12·1 answer
  • What does the term hardware refer to?
    13·1 answer
  • Which component, located on the motherboard, carries out all the instructions provided by computer programs? ram?
    5·1 answer
  • What is the google search operator that limits results to a specific domain?
    8·1 answer
  • Sierra needs to ensure that when users are entering data into a datasheet or form that they are limited in the values they can s
    15·2 answers
  • Who Invented Abacus!
    15·1 answer
  • dion training just installed a new webserver within a screened subnet. you have been asked to open up the port for secure web br
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!