1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
4 years ago
12

Consider a relation representing the present position of molecules in a closed container. The attributes are the ID for the mole

cule, the X, Y, and Z coordinates of the molecule, and its velocity in the X, Y, and Z dimensions. Refer to the X, Y, and Z coordinates as PX, PY, and PZ respectively, and the X, Y, and Z velocities as VX, VY, and VZ respectively.
a) What functional dependencies do you expect to hold?

b) What are the keys?

c) Other than the keys list three superkeys.

d) Other than the keys how superkeys are there?

Computers and Technology
1 answer:
pshichka [43]4 years ago
8 0

Answer:

See attached picture.

Explanation:

You might be interested in
Write a Python function LetterGame() that repeatedly asks the user to input a letter. The function is to count the number of vow
kotegsom [21]

Answer:

def LetterGame():

   vowels = ["a", "e", "i", "o", "u", "A", "E", "I", "O", "U"]

   count1 = count2 = 0

   while True:

       choice = input("Enter a letter / digit to stop: ")

       if choice.isdigit():

           break

       elif choice.isalpha():

           count1 += 1

           if choice in vowels:

               count2 += 1

   print("You entered " + str(count1) + " letters, " + str(count2) + " of which weere vowels.")

   print("The percentage of vowels was " + str(count2 / count1 * 100) + "%")

LetterGame()

Explanation:

Create a function called LetterGame

Inside the function:

Create a list of vowels

Initialize count1, counts the total letters, and count2, counts the vowels

Initialize a while loop that iterates until the specified condition is met in the loop

Get the input from the user. If it is a digit, stop the loop. If it is an alphabet, increase the count1 by 1, and also check if it is a vowel. If it is a vowel, increment the count2 by 1

When the loop is done, print the required information

Finally, call the function

4 0
3 years ago
Who was the mvp of the 1989 nba regular season
zvonat [6]
<span>Magic Johnson of the <span>Los Angeles Lakers.</span></span>
7 0
3 years ago
Without middleware, different bi programs cannot easily connect to the data warehouse. group of answer choices
inna [77]

Without middleware, different BI programs cannot easily connect to the data warehouse: True.

<h3>What is a data warehouse?</h3>

A data warehouse can be defined as a logical collection of information that are gathered or obtained from many different operational databases, in order to both support and enhance day-to-day business analysis activities and decision-making tasks of various employees who are working in a business organization.

This ultimately implies that the primary purpose of a data warehouse is to logically aggregate a collection of information from all the departments in a business organization into a single repository.

However, we can infer and logically deduce that without middleware such as application server, different Business intelligence (BI) programs won't easily connect to the data warehouse.

Read more on data warehouse here: brainly.com/question/18565560

#SPJ1

7 0
2 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
One type of CAPTCHA is ________. a rootkit virus the wavy hard-to-read letter and number sequence that you type to prove that yo
sergejj [24]
<h2>password method</h2>

Explanation:

Rootkit virus is one type of virus which is hidden about its existence and tries to affect the maximum number of system.

Password method: This is a graphical method to identify the text hidden in the signature and confirming that it is not a robot or any other system to protect the system from hacking. This would be really hard-to-read and thus ensures safety.

Antivirus software: This is a system to protect the system, when the virus tries to attack the system. An indication will be given through the software to the user.

4 0
3 years ago
Other questions:
  • Write a program that determines the price of a movie ticket (similar to the one in the chapter). The program asks for the custom
    9·1 answer
  • How do you create a reference page in apa format with all websites?
    5·1 answer
  • I have a samsung tab 2 10.1 and all of my apps stopped working. Can anybody help me?
    13·2 answers
  • . How are returnspredicted in modern microprocessors?
    9·1 answer
  • . Why should we favor programming to interfaces over implementations?
    6·1 answer
  • (asking again because point-hogs exist)
    11·1 answer
  • OH GOD PLEASE HELP I CAN'T FIGURE THIS OUT-
    6·1 answer
  • PLS FAST DONT EXPLAIN
    13·1 answer
  • Ismael is examining a report in Access. He needs to access a view that will be used to examine and change the structure of the r
    9·2 answers
  • I try to make an account so I can have some help, but it always says "We’re sorry, but we are not able to complete your registra
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!