1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
4 years ago
9

Identify two entities and 2 of their attributes from the given scenario.

Computers and Technology
1 answer:
polet [3.4K]4 years ago
8 0

Bookstore and BookSearch are the two entities for the given scenario.

Explanation:

  • For the given Book.com virtual store, there can be two entities like Bookstore and BookSearch.
  • Bookstore can have all the details of the books in the virtual store. hence the attributes can be
  • Bookstore attributes: bookname, Authorname, Publisher, Publishedyear, Agegroup, category.
  • BookSearch entity can be used to search the books in the virtual store.
  • Booksearch attributes: bookname, category, bookid, authorname.
You might be interested in
This is a legitimate question if you have a problem then just ignore it. What is the difference between CRVM and SAPX in a progr
g100num [7]

Answer: SAPX is used with Java

Explanation:

4 0
3 years ago
Read 2 more answers
The DNS server at your headquarters holds a standard primary zone for the abc domain. A branch office connected by a slow WAN li
mafiozo [28]

Answer:

In the SOA tab of the zone's Properties dialog box, increase the refresh interval.

Explanation:

5 0
3 years ago
People of brainly Just a quick warning that there is a group of people posting links with virus.
valina [46]

Answer:

Thank you, they post on EVERY. SINGLE. QUESTION.

Explanation:

They keep posting the same file every time, but they might change the file after seeing this post. Please just don't click any files!

7 0
3 years ago
Read 2 more answers
State ONE (1) disadvantage of using computers to store and process<br> information.
NNADVOKAT [17]

Answer:

it can be hacked

Explanation:

there is always a chance for computer data to be hacked

3 0
3 years ago
Folktales have characters with good or bad traits here are some good wise clever kind hardworking I have too add one more good t
s2008m [1.1K]

Answer: good generous bad greedy

Explanation:

5 0
3 years ago
Other questions:
  • "what is the name of the ipsec configuration file"
    9·1 answer
  • Data that are collected on large populations of individuals and stored in databases are referred to as _____.
    15·1 answer
  • A user has been complaining that their wireless connection has been connecting and disconnecting too frequently. what command co
    15·1 answer
  • The methods in a subclass can use all of the data fields and methods that belong to its parent, with one exception: ____ members
    11·1 answer
  • Given a Student class, create a class with following characteristics:
    6·1 answer
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • Technology trends in education play a key role in a student’s
    15·1 answer
  • Which of these expressions is used to check whether num is equal to value?
    13·1 answer
  • What do u mean by generation of computer
    12·1 answer
  • What is the console.log function for?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!