1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
4 years ago
10

After you identify and subdivide all of the data elements for a database, you should group them by the entities with which they’

re associated. The entities will become the tables of the database, and the elements will become the:____________.
Computers and Technology
1 answer:
Zinaida [17]4 years ago
8 0

Answer:

Column

Explanation:

A column is to a table what an attribute is to an entity. Invariably, when a business model is converted into a database model, entities become tables and attributes become columns. A column shows one related part of a table and is the smallest logical structure of storage in a database.

You might be interested in
1. Describe a system that would be dangerous if resistance were not a part of the circuit
Ivahew [28]
A bomb system. That might be pretty dangerous
5 0
3 years ago
Read 2 more answers
1.is there a digital way to mark your favorite website in the internet?Expound your thoughts.
charle [14.2K]

Yes, there is a way to mark your favourite website on the internet by adding it to bookmark

Explanation:

No, I didn't find it difficult to create a bookmark.

It was easy you just have to click on the bookmark button

5 0
3 years ago
I need help with this problem please
alina1380 [7]

Answer:

i think its d

8 0
3 years ago
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
g A user receives an email from an unknown source with a link to a website asking for their password. The userenters in their pa
SCORPION-xisa [38]

Based on the information provided, this user is a victim of phishing.

<h3>What is phishing?</h3>

Phishing can be defined as a type of cyberattack which involves making an attempt to obtain sensitive user information such as a password, especially by disguising as a trustworthy entity in an electronic communication (email), which is usually over the Internet.

In this context, we can infer and logically deduce that this user is a victim of phishing because he or she received an email from an unknown source with a link to a website asking for their password.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

5 0
2 years ago
Other questions:
  • If you wanna buy a Monitor, please explain why you wanna buy it! PLEASE HELP ME!!!!!!!!!!!!!!!!!!!!!!!!!
    9·1 answer
  • To close a window in Windows 10, you can _____. Select all that apply. A. right-click its button on the taskbar, then click Clos
    11·1 answer
  • Why is brainly not working it say im logged out rn but im not i cant acces anything but this
    12·2 answers
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • What is the ribbon used for in word
    9·1 answer
  • Write a recursive function is_pow2(n) that returns True if the positive integer n is an integer power of 2, and False otherwise.
    9·1 answer
  • Because of increasing advances in technology, there are careers available that weren’t even invented 10 years ago. One such care
    13·1 answer
  • PLEASE IM IN AN EXAM I NEED HELP ASAPPP<br> (Appshed question)
    7·2 answers
  • What is a BUG in terms of computer programming?
    7·1 answer
  • All of the following are properties of a relation except __________.Group of answer choicesThe order of tuples (rows) is not sig
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!