1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
4 years ago
5

Which of the following is NOT a design choice when using the ER model?

Computers and Technology
1 answer:
wlad13 [49]4 years ago
6 0

Answer:

Relationship vs N-ary Relationship

Explanation:

It is not part of the design choice in ER model because N-ary reflects an indefinite form or better still creates an identifying attribute in an ER relationship. Example is the process of creating an auto-generated ID value

You might be interested in
Your mother wants to purchase a large hard drive for her computer ex you to see what type of dry interphase she has her computer
SpyIntel [72]

That is the SATA or data cable. I have built a computer myself and I have also struggled with cables. SATA cables can connect to almost every type of hard drives.


3 0
3 years ago
The data _____ component of a database management system (DBMS) is used to create and maintain the data dictionary. manipulation
Ira Lisetskai [31]

Answer:

definition

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

Hence, the data definition component of a database management system (DBMS) is used to create and maintain the data dictionary.

6 0
3 years ago
In cell B20, enter a
zzz [600]

Answer:

かあなたは棚田やヌタほたややあはあやあやあさあ与田弥太は沙汰やあはあわあね、田やホワアラハやくださいヤアカやさ矢田かほあや体は白湯のやさた

Explanation:

なたさたらなやさゆなやさら

5 0
2 years ago
What are the answers to 14 and 15
RoseWind [281]
The answer to 14 is c and the answer to 16 is a
6 0
4 years ago
When you call one of the Scanner class's methods to read a primitive value, such as nextInt or nextDouble, and then call the nex
Rzqust [24]

The answer is true.

Explanation:

The scanner class's methods are the methods in java.util, which allows the user to read values of various types. If the nextLine is issued after a numeric read and the numeric value is at the end of the line, nextLine returns the empty string.

The problem occurs when you click the enter key which is a new line \n character. nextInt() has only the integer but skips the new line \n.

To solve this problem, you have to add the input.nextLine() after reading the int it will consume the \n.

Hence, make input.nextLine(); call after input.nextint(); which reads till end of life.

5 0
3 years ago
Other questions:
  • You have created a number of different documents using several applications including word, excel, and powerpoint. these files a
    10·1 answer
  • In programming, what is a string?
    8·2 answers
  • ___ apps can allow you to lock your mobile device and sim card remotely.
    15·1 answer
  • Match the installation type to its description.
    9·1 answer
  • What are the defenses to protect against these attacks?
    13·1 answer
  • Explain the principle of a Kimball as a data input device<br>​
    5·2 answers
  • Which of the following is true of a procedure? Check all that apply.
    10·2 answers
  • nder a Huffman encoding ofnsymbols with frequenciesf1, f2, . . . , fn, what is the longest a codewordcould possibly be
    13·1 answer
  • In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
    11·1 answer
  • List ten features of word processing packages​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!