1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Drupady [299]
3 years ago
13

1. In the Entity-Relationship Model, relationships can have attributes. T/F

Computers and Technology
1 answer:
Anestetic [448]3 years ago
5 0

Answer:

 1. True  2. True 3. Conceptual 4. 3 tables.

Explanation:

1. In the ER Model relationships can have attributes associated to them. For example in an organisation there is a one-to-one relationship between Employee and Department entities i.e. an Employee manages a Department and each Department is managed by some Employee. If you want to store the Start_Date from which the employee began to manage the department then you can give the Start_Date attribute to the relationship manages.

2. Attributes are the smallest division of data in the ER diagram. Attributes are used to describe an entity.For example an Employee entity can have the attributes Name, DateofBirth, Address, Salary. Attribute is represented by an oval with a name inside in ER diagram.

3. Conceptual  

Conceptual level is the highest level ER model as it contains less but defines the overall scope of the model.  It defines the data entities that are commonly used by the organization. A model on conceptual level of abstraction captures and represents business scope of the problem. It depicts the most important entities and the relationships between these entities.  A conceptual ER model can be used as the base for one or more logical data models. Conceptual level describes or defines the structure of the whole database. It hides details about the physical storage and concentrates on describing entities, relationships, etc.  It is part of the conceptual stage of database design and it provides a high-level data description.

4. 3 tables can be used to represent this relationship. One is a Student table. Second is the Class table. Now if we see the relationship. A student can take many classes. A class can be taken by many students. This is a many-to-many relationship between these two entities. It is not directly possible to implement this type of relationship in a database. To implement this relationship it has to be broken into 2 one to many relationships.  In order to do this, a new entity has to be created. So create one more table to establish a relationship between Student and Class entities. Primary keys of Student and Class tables are added into new table to create a composite primary key. This table can be named as Enrollment. Hence 3 tables are used.

You might be interested in
Write a program that takes a point (x,y) from theuser and find where does the point lies. The pointcan
agasfer [191]

Answer:

C++ Program .

#include<bits/stdc++.h>

using namespace std;

int main()

{

int x,y;//declaring two variables x and y.

string s;//declaring string s..

cout<<"enter x and y"<<endl;

cin>>x>>y;//taking input of x and y..

if(x>=0 &&y>=0) //condition for 1st quadrant..

cout<<"the point lies in 1st Quadrant"<<endl;

else if(x<=0 &&y>=0)//condition for 2nd quadrant..

cout<<"the point lies in 2nd Quadrant"<<endl;

else if(x>=0 &&y<=0)//condition for 3rd quadrant..

cout<<"the point lies in 3rd Quadrant"<<endl;

else //else it is in  4th quadrant..

cout<<"the point lies in 4th Quadrant"<<endl;

cout<<"enter n to terminate the program"<<endl;

while(cin>>s)//if the user has not entered n the program will not terminate..

{

   if(s=="n")

   {

       cout<<"the program is terminated"<<endl;

       exit(0);

   }

   cout<<"you have not entered n please enter n to terminate the program<<endl;

}

}

Explanation:

The above written program is for telling the point lies in which quadrant.I am first declaring two variables x and y.Then after that taking input of x and y after that checking in which quadrant the point lies.

Taking input of the string s declared earlier for program termination the program will keep running until the user enters n.

4 0
3 years ago
What is a data broker?
AleksAgata [21]

Answer:

The correct option is a.

A business that collects personal information about consumers and sells that information to other organizations.

Explanation:

Data brokers, also known as data suppliers, data fetchers, information brokers, or even data providers are businesses or companies (even individuals) that, on the most basic level, source and aggregate data and information (mostly information that are meant to be confidential or that are in the real sense difficult to get) and then resell them to third parties. These third parties could be other data brokers.  

They collect data and information from a wide range of resources and sources - offline and/or online e.g web access history, bank details, credit card information, official records (such as birth and marriage certificates, driver's licenses).  

Brokers can steal round about any information. Examples of information that brokers legally or illegally steal are full name, residential address, marital status, age, gender, national identification number, bank verification number. Brokers and hackers are siblings.

A couple types of data brokers are:

1. Those for fraud detection

2. Those for risk mitigation  

Hope this helps!

6 0
3 years ago
Any file that contains data but not instructions for your computer is not considered software
DIA [1.3K]
True. 

But then again, partly false. A .deb file (Debian, Ubuntu Linux) contains data, but that data needs to be installed and marked executable to make the software.

But i would still say true.
5 0
3 years ago
What is the default text-wrapping option when inserting images into a Word document?
JulijaS [17]

Answer:

In line with the text

Explanation:

8 0
3 years ago
Read 2 more answers
Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
viva [34]

it would be b.mailing list


5 0
3 years ago
Read 2 more answers
Other questions:
  • PLEASE HELP ASAP!!!
    15·2 answers
  • Which situation can result in positive population growth?
    14·1 answer
  • Which of the following are valid values for a boolean value in programming? (Select all that apply)
    8·1 answer
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • Implement a recursive method named power that takes 2 integer parameters named base and expo. The method will return the base ra
    6·1 answer
  • During the design phase of the systems development life cycle (SDLC), the _____ design is created for a specific platform, such
    8·1 answer
  • 2. Which Interface uses
    7·1 answer
  • Question is on the picture thank you
    10·1 answer
  • your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
    14·1 answer
  • The function that overloads the ____ operator for a class must be declared as a member of the class.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!