1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
10

The M:N relationship between STUDENT and CLASS must be divided into two 1:M relationships through the use of the ENROLL entity;

the ENROLL entity is ____.
Computers and Technology
2 answers:
Leya [2.2K]3 years ago
4 0

Answer:

Weak entity.

Explanation:

A weak entity is that which might reside simply when it is possessed through any other thing or individual.

  • Such as, There would always be the room in a building.
  • In the other hand, a tire may be called a powerful force, although it may even reside without getting connected to a Vehicle.

Thus, from the above statement, the following answer is true

zubka84 [21]3 years ago
3 0

Answer:

The answer is "weak".

Explanation:

In the given statement some option is missing which can be described as follows:

A) weak  

B) strong  

C) optional

D) mandatory

The weak entity is an object, which could not be described specifically by its properties only, It should have a foreign key to create a primary key in comparison to its attributes, and wrong choices can be explained as follows:

  • In option B, It describes the relationship with the weak entities.
  • In option C, It describes the relationship, which is not necessary.
  • In option D, In every case, an entity could be affiliated with another entity, but this is not necessary.
You might be interested in
What protein is found in hair and nails
Yuliya22 [10]

Keratin is found in both hair and nails.

Hope this helps!

4 0
3 years ago
Read 2 more answers
Assume the system with 256B memory and 64B cache and the block size of 16 bytes. I.e., there are 4 blocks in the cache. (a) For
Nataliya [291]

Answer:

Check the explanation

Explanation:

1.

System = 256Byte = 8 bit

Cache = 64B , block size = 16 byte.

A) Direct Mapped Cache:

Block offset = log (Block size) = log 16 = 4bit

Total # of block inside cache = 4.

Therefore index offset = log 4 = 2bit.

Remaining is tag bits.

Therefore tag bits = 8-(4+2) = 8-6 = 2 bits

Tag                              Index offset                                Block offset

(2 bits)                             (2 bits)                                           (4 bits)

Fully associative cache :

In fully associative cache, any of main memory block can be placed anywhere in cache. Therefore index offset =0 bits.

Therefore tag bits = 8-block offset bit= 8-4 =4bits

Tag                               Block offset

(4 bits)                                (4 bits)

4 0
3 years ago
An independent frame that holds a program, document, or folder contents in windows 7 is called a ____.
svetlana [45]
Window.

Have a wonderful day!~
7 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs.
professor190 [17]

Answer: James is all of the above

Explanation:

4 0
2 years ago
Nina, a programmer, wants to use the programming language Primavera. For which application area should Nina use this language?
AnnyKZ [126]

C. Drawings is the correct answer

8 0
2 years ago
Read 2 more answers
Other questions:
  • Universal Containers is setting up an external Business Intelligence (BI) system and wants to extract 1,000,000 Contact records.
    11·1 answer
  • A powerpoint ________ is a set of unified design elements.
    5·1 answer
  • You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a cal
    10·1 answer
  • :If a process terminates, will its threads also terminate or will they continue to run? Explain your answer.
    14·1 answer
  • Write a program that asks the user for two file names. The first file will be opened for input and the second file will be opene
    8·1 answer
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • Describe the main roles of the communication layer, the network-wide state-management layer, and the network-control application
    15·1 answer
  • Mha lovers why do other anime lovers report mha lovers for not liking there anime?
    6·2 answers
  • which of the following is not a driver of wireless growth? group of answer choices universal access to information and applicati
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!