1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
4 years ago
10

Composite primary keys are particularly useful as identifiers of composite entities, where each primary key combination is allow

ed only once in the _____ relationship.
Computers and Technology
1 answer:
notka56 [123]4 years ago
6 0

Answer:

M:N is the correct answer of this question.

Explanation:

M:N relationship is known as many to many relationship.

There is a many-to-many relationship when numerous data in a table are connected to duplicate entries from another table.The multiple-to-many relation is typically a duplicate of the true-life association between entities represented by the two or more  tables.

  • A Relation is a kind of fractal dimension corresponding to the partnership between two entities.
  • A and B where A may comprise a case of a parent and therefore there are numerous children in B, and opposite of that also occur.

You might be interested in
Why should one avoid noise in the computer room​
iragen [17]
Is this a joke bc if so why?
5 0
3 years ago
Read 2 more answers
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
What is the most consistent item regardless of the software used in BI?
vodomira [7]

Answer Explanation:

Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.

THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :

  • data analyst has the most responsibility of BI he is the most important part of BI
  • It is the interconnected process of inspection changing and modeling
  • data analysis is hugely aided by data mining
5 0
3 years ago
The two primary methods of memory allocation are:
levacccp [35]

Answer:

The answer is

Stack and heap

4 0
3 years ago
Lenders always accept applications for credit
LenKa [72]
The correct answer to the question that is being stated above is FALSE.

The statement is false because lenders do not always accept applications for credit. Lenders always consider credit history of the applicant. If the applicant has a good credit history background, then he qualifies.
3 0
4 years ago
Other questions:
  • How do you take a screen shot on hp pavilion dm3
    12·1 answer
  • All objects in an object-oriented program are instantiated (created) from a ____.
    12·1 answer
  • Which of the following things would you access from the Program & Courses page? Course descriptions Tutorial videos Account
    7·1 answer
  • Why are file naming conventions essential
    13·2 answers
  • The destructor automatically executes when the class object goes out of ____.
    12·1 answer
  • A DBMS makes the: a. relational database available for different analytical views. b. physical database available for different
    12·1 answer
  • What is a computer OPERATING SYSTEM?
    10·1 answer
  • Which of the following is not a characteristic of a good value log entry
    15·1 answer
  • Add me on Pokemon go, my trainer code is 5584 3300 5313
    13·1 answer
  • Being technologically literate requires being able to ______. a. use advanced graphics manipulation tools (adobe photoshop) b. u
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!