1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alukav5142 [94]
4 years ago
9

For the description below, develop an E-R diagram:

Computers and Technology
1 answer:
xeze [42]4 years ago
4 0

Answer:

See explaination

Explanation:

E-R diagram:

Entity Relationship Diagram, also known as ERD, ER Diagram or ER model, is a type of structural diagram for use in database design. An ERD contains different symbols and connectors that visualize two important information: The major entities within the system scope, and the inter-relationships among these entities.

Please kindly check attachment for for the ERD of the question asked.

You might be interested in
Select the correct answer from each drop-down menu. Rita runs a small business that designs custom furnishings for corporate cli
LUCKY_DIMON [66]

Software as a Service cloud model is ideal for Rita’s business. SaaS are office solutions that allow Rita’s small business to work more efficiently and in a more organized way. Most SaaS applications are used for invoicing and accounting, sales, performance monitoring, and overall planning. SaaS applications can save Rita money. They do not require the deployment of a large infrastructure at her location. As a result, it drastically reduces the upfront commitment of resources. Whoever manages SaaS’s IT infrastructure running the applications brings down fees for software and hardware maintenance. SaaS has generally been acknowledged to be safer than most on-premise software.

5 0
3 years ago
Read 2 more answers
The concurrent process model defines a set of "states." describe what these states represent in your own words, and then indicat
nikitadnepr [17]

Answer:

Explanation:

Concurrent Process model can be regarded as evolutionary process model as well as software engineering is concerned, it allows to know the current state of activities as well as their associated states.

The set of states In the concurrent process model are:

✓awaiting changes

✓Inactive

✓baselined

✓under development

✓under revision

✓under review

✓done

The stated "states" above give a representation of externally observable mode as regards to the behaviour of activities of a particular software engineering.

The existence of activities of software engineering do exist at same period

In concurrent process model, though each of the activities occur in different states so that process network is produced. The movement from one state to another of activity of software engineering is as a result of

predefined events.

5 0
3 years ago
What was Pike's objective on his first expedition in 1805?​
Furkat [3]
Zebulon Pike, the U.S. Army officer who in 1805 led an exploring party in search of the source of the Mississippi River, sets off with a new expedition to explore the American Southwest. Pike was instructed to seek out headwaters of the Arkansas and Red rivers and to investigate Spanish settlements in New Mexico.
8 0
3 years ago
Operations that run in protected mode must go through which of the following before they can access a computer’s hardware? A. Ke
HACTEHA [7]

Answer:

Option A (Kernal) seems to be the right answer.

Explanation:

  • A Kernel appears to be the central component of such an OS. This handles machine as well as hardware activities, including most importantly storage as well as CPU power.
  • This manages the majority of the initialization as well as program input/output requests, converting them into CPU data-processing commands.

The other given option are not related to the given circumstances. So that option A would be the right answer.

3 0
3 years ago
What are the four levels of access rights?
Svet_ta [14]

Explanation:

Currently, there are four primary types of access control models: mandatory access control (MAC), role-based access control (RBAC), discretionary access control (DAC), and rule-based access control (RBAC). Each model

5 0
3 years ago
Other questions:
  • Variables make it easier to do what?
    10·1 answer
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • If a table is designed so that every determinant is a candidate key, then that relation is in ________.
    14·1 answer
  • HELP 11 pointsw to the person who helps me
    11·2 answers
  • Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of eva
    14·1 answer
  • Describe how to add slide numbers and image to a Microsoft power point presentations ?​
    5·1 answer
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
  • What is the key difference between a class and an object
    12·1 answer
  • You're doing desktop support and the company policy is that you can only help with company equipment. A user walks in:
    6·1 answer
  • Which of the following BEST describes a permissive software license?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!