1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
White raven [17]
3 years ago
11

What role does normalization play in good and bad table structures, and why is normalization so important to a good table struct

ure?
Computers and Technology
1 answer:
Ahat [919]3 years ago
8 0

Explanation: Normalization is the process through which the reduction in the redundancy of data can happen.It makes the redundant in control which decrease the issue of the data integrity that appears in the good and bad database tables.

In good tables it functions for the storing of the objects in the relational database which is a difficult task and thus helps in the linking of the tables of databases.The same information level can be maintained for the different places. These are reason that normalization is important for the good table.

You might be interested in
The camera on a phone or laptop can be used to track a user's eye movements. Which of these is NOT one of the possible applicati
AnnyKZ [126]

Answer:

The question is incomplete. The full question is the following one:

"The camera on a phone or laptop can be used to track a user's eye movements. Which of these is NOT one of the possible applications of this technology (as listed in the course reading):

All of these ARE:

Measuring the user's intelligence,

Gathering marketing information for advertisers,

Detecting cognitive disorders."

The correct answer is: "Measuring the user's intelligence".

Explanation:

This technology is also known as eye tracking technology and has to do with a sensor that tracks eye movement and interaction with machines, such as mobiles and computers. The only option which does not apply to this technology and its features is the first one, "Measuring the user's intelligence", because "intelligence" is very subjective and abstract, it is not something a sensor can measure, although eye tracking technology can measure the amount of production concerning certain topics, the level of interest, attention, and interaction, and some cognitive disorders people behave, such as Attention Deficit Hyperactivity Disorder (ADHD). Besides that, companies, agencies, and institutional systems may track and gather people's eye movements in order to share them with other companies, agencies, and institutions for improving marketing, production, and interests.

(ps: mark as brainliest, please?!)

8 0
3 years ago
Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr
dusya [7]

Answer:

Explanation:

mostTickets=0;

for (k=0; k< ndays; k++){

if (parkingTickets[k]>mostTickets) mostTickets=parkingTickets[k];

}

7 0
3 years ago
"the ____ criteria filter requires the records displayed to have the specified text string anywhere."
Debora [2.8K]

The contains criteria filter requires the records displayed to have the specified text string anywhere. Thecontains operator is used to perform case-sensitive matching regardless of location in strings.

The begins with criteria filter on the other hand requires the records displayed to start with the specified text string

3 0
3 years ago
In a c program, if you see a variable in main declared: float farray[20]; describe what farray is
Bas_tet [7]
An array of floats that can hold up to 20.
3 0
3 years ago
I will mark you as brainlist
weeeeeb [17]

Answer:

download it

Explanation:

because if u upload it will not save .

7 0
2 years ago
Read 2 more answers
Other questions:
  • Generally speaking, mobile sites are good for acquiring new customers and inspiring new relationships while mobile apps are good
    6·1 answer
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a
    11·2 answers
  • What is the name of the program file that you can enter in the Windows search or Run box to execute Event Viewer? What process i
    12·1 answer
  • #Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find
    11·1 answer
  • To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the docum
    9·1 answer
  • A real-world problem that might be explained or predicted through the creation of a computer simulation
    7·1 answer
  • An internet connection is required to access which type of software?
    5·1 answer
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • Explain the following IT terms Network: Packet: Router: IP address: Server: LAN: WAN: Bus topology: Ring topology: Star topology
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!