1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
5

Which of the following is NOT a design choice when using the ER model?

Computers and Technology
1 answer:
wlad13 [49]3 years ago
6 0

Answer:

Relationship vs N-ary Relationship

Explanation:

It is not part of the design choice in ER model because N-ary reflects an indefinite form or better still creates an identifying attribute in an ER relationship. Example is the process of creating an auto-generated ID value

You might be interested in
Which of the following is a school-to-work program that provides the student with paid employment, school credit, and school gra
vovangra [49]

Cooperative education program

6 0
3 years ago
Read 2 more answers
What does the asterisk (*) after select tell the database to do in this query?
OlgaM077 [116]

In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

<h3>What does asterisk (*) mean in SQL?</h3>

The term means all columns. Note that The asterisk or star symbol ( * ) is a term that implies all columns in a given database.

Therefore, In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

brainly.com/question/1620017

#SPJ11

4 0
2 years ago
Why is time management considered a soft skill
FinnZ [79.3K]
This is due to the simple fact that time management helps you not only get things done for yourself, but also not get in the way of others and let them get things done for themselves. It's like working in harmony.

Hope this helps! <3
5 0
3 years ago
Read 2 more answers
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Write the use of the Goto statement with the help of an example.
kogti [31]
Sorry for this but to be honest we do t get taught this in the school I go to sorry
3 0
3 years ago
Other questions:
  • The essence of strategy is ____, so competitive advantage is often gained when an organization tries a strategy that no one has
    15·1 answer
  • Oday's color display devices represent color using the ______ color model.â
    13·1 answer
  • How is typing speed measured
    12·2 answers
  • A disadvantage of a bus network is that _____. a. failure in one workstation necessarily affects other workstations on the netwo
    7·1 answer
  • Which best describes the differences between a resume and a CV?
    13·2 answers
  • In vehicles equipped with ABS, the driver's foot must remain firmly on the _________ to activate the ABS.
    7·2 answers
  • What should you do if your computer is running slower
    12·1 answer
  • • Comments are blank which can be blank entered into documents
    5·1 answer
  • Which user interface part shows graphical output of mined data?
    8·2 answers
  • Pls say correct guyz pls pls pls
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!