1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
3 years ago
12

Consider a relation representing the present position of molecules in a closed container. The attributes are the ID for the mole

cule, the X, Y, and Z coordinates of the molecule, and its velocity in the X, Y, and Z dimensions. Refer to the X, Y, and Z coordinates as PX, PY, and PZ respectively, and the X, Y, and Z velocities as VX, VY, and VZ respectively.
a) What functional dependencies do you expect to hold?

b) What are the keys?

c) Other than the keys list three superkeys.

d) Other than the keys how superkeys are there?

Computers and Technology
1 answer:
pshichka [43]3 years ago
8 0

Answer:

See attached picture.

Explanation:

You might be interested in
Answered
Zina [86]

Answer:

You could think about this in several ways with several approaches.

- Survey

- User testing in groups

- On the actual registration program, 3 questions pop up

With general open ended questions and by talking to users

Explanation:

- Demographics

- Ask them what they like about the registration program

- What they use the registration for

- What they would do to improve it

6 0
2 years ago
The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
d1i1m1o1n [39]

Two things that I can do in order to protect these assets with the use of the computer or the internet is by first, downloading and using an antivirus software where this has the ability to protect the computer from invaders, hackers and other viruses that could get into the system of the computer. Second, making the data encrypted, so that it will be protected with a code to prevent other people who are trying to get in the data.

3 0
3 years ago
Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that i
Diano4ka-milaya [45]

Answer:

The method written in Java is as follows:

public static ArrayList<Double> removeHighPrice (ArrayList<Double> prices){

       for(int i =0;i<prices.size();i++){

     if(prices.get(i) > 5.00){

         prices.remove(i);  

         break;

     }

 }

 return(prices);  

 }

Explanation:

This line declares the method

public static ArrayList<Double> removeHighPrice (ArrayList<Double> prices){

This line iterates through the ArrayList named prices

       for(int i =0;i<prices.size();i++){

This checks if current price is greater than 5

     if(prices.get(i) > 5.00){

If yes, the price is removed

         prices.remove(i);  

And the loop is terminated

         break;

     }

 }

This returns the ArrayList

 return(prices);  

 }

<em>I've added as an attachment, the complete program which includes the main method</em>

Download txt
6 0
3 years ago
An output device is any device that displays, prints, or plays content stored on a computer. from the list below, identify the d
inysia [295]
Answer is C = Speaker

How? as the speaker is the only item on the list that displays any type of content, that being audio, it's the only feasible answer to this question.
3 0
3 years ago
Name and describe the two (2) broad categories of files
fenix001 [56]
If it’s computer files, that would be System Software and Application software.

“The System Software is the programs that allow the computer to function and access the functionality of the hardware. Systems software sole function is the control of the operation of the computer.

Applications software is the term used for programs that enable the user to achieve specific tasks such as create a document, use a database or produce a spreadsheet.”
8 0
3 years ago
Other questions:
  • Diane wants to maintain a record of grades scored in the fifth, sixth, and seventh grades. She enters her grades and the total p
    13·1 answer
  • You are to create a program using Python that asks the user for a nonnegative number, then computes the mean and variance using
    15·1 answer
  • Emma lives in Pennsylvania, what climate does she live in?
    7·1 answer
  • Kris is the project manager for a large software company. Which part of project management describes the overall project in deta
    11·2 answers
  • What type of web provides a framework that allows data to be shared and reuse to deliver
    9·1 answer
  • 10010 - 1011 binary subtraction​
    5·1 answer
  • When you login to your blogging account. The first screen with all controls, tools and functions is called .... Select one: a. D
    10·1 answer
  • To indent an entire paragraph or list you should:
    9·1 answer
  • Suppose that a particular algorithm has time complexity T(n) = 3 \times 2^nT(n)=3×2 ​n ​​ and that executing an implementation o
    14·1 answer
  • 5 points)*list all of the data that needs to be kept track of for the scenario above in a 1nf (flat file) table (20 points)*use
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!