1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
4 years ago
13

Peter Chen developed ERDs in 1976. Since then Charles Bachman and James Martin have added some slight refinements to the basic E

RD principles. You should use the Crow’s foot notation for your diagrams. Describe the use of keys in the database. Can you have more than one key? Explain your answer.
Computers and Technology
1 answer:
shusha [124]4 years ago
8 0

Answer:

Check the explanation

Explanation:

In RDBMS relational database, the keys play an essential role in making the database reliable and relational in which two or more relations (tables) can be divided into a range of relations with the use of diverse types of keys due to which the redundancy decreases and flexibility of data storage increases.

The following are the usage of keys in a database:

   It helps in identifying a specific record that is present in the table.

   It is used in minimizing the redundancy from the tables.

   It is used in removing the multi-valued attributes from the relations.

   it helps in connecting one table with others by using Foreign keys.

   It is used in maintaining the uniqueness of the data stored in the database.

   It helps in identifying the relationship between two or more tables.

Types of keys in a relational database:

   PRIMARY KEY: It helps in identifying each record uniquely due to which the redundancy of data can be minimized.

   FOREIGN KEY: It is a kind of referenced key that helps in making a relationship between two or more tables. It helps in fetching records by combining two or more tables with the help of different joins.

   SUPER KEY: It is a combination of two or more keys that can be selected as primary. It may contain those columns which have repeated values.

   COMPOUND KEY: It is a combination of those columns which may not be used independently as the identification of unique records but their combination does.

   CANDIDATE KEY: It is a kind of a super key that does not contain repeated records. A primary key can be chosen from candidate keys.

You might be interested in
HTML is the authoring language developed to create web pages and define structure and layout of a web document
Eduardwww [97]

Answer:

true

Explanation:

7 0
3 years ago
Read 2 more answers
Two communicating devices are using a single-bit even parity check for error detection. The transmitter sends the byte 10101010
icang [17]

Answer:

The receiver will not detect the error.

Explanation:

The byte sent by transmitter: 10101010

The byte received by receiver due to channel noise: 10011010

If you see the bold part of the both sent and received bytes you can see that the number of bits changed is 2.

The two communicating devices are using a single-bit even parity check. Here there are two changed bits so this error will not be detected as this single bit even parity check scheme has a limit and it detects the error when the value of changed bit is odd but here it is even.

This parity scheme basically works well with the odd number of bit errors.

7 0
4 years ago
How long does it take to learn python
Alla [95]

Answer:

five to 10 weeks

On average, it can take anywhere from five to 10 weeks to learn the basics of Python programming, including object-oriented programming, basic Python syntax, data types, loops, variables, and functions.

:

3 0
3 years ago
Read 2 more answers
Happy Valentine's day!!
Lorico [155]
Happy valentine’s u too !!
7 0
2 years ago
To create a multi-column and multi-row box for users to type into in an html form, use the ____________ tag pair
alexgriva [62]

To create a multi-column and multi-row box for users to type into in an html form, use the <textarea></textarea> tag pair.

<span>The html tags are the codes or the hidden keywords in the web browser to tell about its format and displayed content. The html tags mostly comes in pairs, pair consist of the start tag and end tag.</span>
4 0
3 years ago
Other questions:
  • Ten 9600-bps lines are to be multiplexed using TDM. a. Ignoring overhead bits in the TDM frame, what is the total capacity requi
    6·1 answer
  • You have found statistics on the Internet that you would like to use in your speech.
    6·1 answer
  • What development in operating systems happened between the years 1990 and 2000?
    15·1 answer
  • How can you tell that you're driving in the right direction?
    14·1 answer
  • How do you check how much space is left in current drive?
    9·1 answer
  • What should be used to screw on broadheads? needle-nose pliers gloves thumb and forefinger only specially designed wrench
    6·1 answer
  • The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform addr
    8·1 answer
  • A business letter is not written:
    6·1 answer
  • Positive use of the technology before the pandemic.
    8·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!