1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
krek1111 [17]
3 years ago
13

Basics AutoCare is a small auto service business with two locations in a Midwest (U.S.) city. The business is based on providing

routine maintenance at fixed cost to car owners. The owners have decided to computerize their operations to allow them to better track their business. Data to be gathered for each service visit includes service ID, service item, service item cost, vehicle owner, owner telephone number, vehicle make and model, vehicle year, and date of service.Assignments:1. Create an ERD for the auto service system.2. Create 3NF table designs for the system.3. For each of the entities identified, design tables and identify the possible candidate keys, the primary key, a probable foreign key, and potential secondary keys.4. Use sample data to populate the fields for three records.

Computers and Technology
1 answer:
kogti [31]3 years ago
5 0

Answer:

The ER diagram for the auto service is shown in the attachment.

You might be interested in
The conventional wisdom concerning the security frameworks of domains is that it is always preferable for an organization to cre
Valentin [98]

Answer:

False

Explanation:

A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.

While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.

6 0
3 years ago
A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
Firlakuza [10]

Answer:

Assuming this can only have one answer, i believe adware is very far from the type of malware that did infect the system, Spyware.

Explanation:

8 0
3 years ago
A word I know, six letters it contains, remove one letter and 12 remains, what is it?
gulaghasi [49]

Answer:

dozens

Explanation:

3 0
3 years ago
What is the process of publishing a work in Photoshop?
Sunny_sXe [5.5K]

Photoshop is a software program developed by Adobe that allows users to edit graphics. It's used by graphic artists, designers and photographers, among others, and can enhance and manipulate images to improve their appearance. It's an excellent tool that makes photo editing easy and efficient.

Explanation:

  • In the past, it produced creative printing or home publishing programs used for desktop publishing too, but the primary page layout software from Corel is CorelDraw
  • Adobe InDesign is a desktop publishing and typesetting software application produced by Adobe Systems. It can be used to create works such as posters, flyers, brochures, magazines, newspapers, presentations, books and ebooks
  • Adobe InDesign is a standard piece of publishing software, and is commonly used by professional typesetters to design the inside pages of books.
  • Select an image, and then choose File > File Info
  • Use the File Info dialog box to view or edit an image's metadata. This dialog box displays quite a bit of information. Many of the settings in it are important in the metadata.
  • Metadata is a set of standardized information about a file, such as author name, resolution, color space, copyright, and keywords applied to it.
8 0
3 years ago
A main reason careers in Information Technology are growing faster than average is
Scorpion4ik [409]
Technology has become such a major part of everyday life
8 0
3 years ago
Other questions:
  • Can your computer become infected with a virus via email
    10·1 answer
  • You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to
    9·2 answers
  • If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
    7·1 answer
  • [Submit on zyLabs] Please write a function with one input, a matrix, and one output, a matrix of the same size. The output matri
    10·1 answer
  • PLEASE HELP!
    12·2 answers
  • Numeric data is stored in what for direct processing
    5·1 answer
  • CODE EXAMPLE 3-1 SELECT vendorName, invoiceNumber, invoiceDate, invoiceTotal FROM vendors INNER JOIN invoices ON vendors .vendor
    13·1 answer
  • A form letter can be customized by using different fields in a __________.
    15·2 answers
  • Given the following schedule, show the locks that will occur and the subsequent schedule. Assume that strict 2PL is in effect, w
    13·1 answer
  • Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a pr
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!