1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
3 years ago
10

Composite primary keys are particularly useful as identifiers of composite entities, where each primary key combination is allow

ed only once in the _____ relationship.
Computers and Technology
1 answer:
notka56 [123]3 years ago
6 0

Answer:

M:N is the correct answer of this question.

Explanation:

M:N relationship is known as many to many relationship.

There is a many-to-many relationship when numerous data in a table are connected to duplicate entries from another table.The multiple-to-many relation is typically a duplicate of the true-life association between entities represented by the two or more  tables.

  • A Relation is a kind of fractal dimension corresponding to the partnership between two entities.
  • A and B where A may comprise a case of a parent and therefore there are numerous children in B, and opposite of that also occur.

You might be interested in
The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
Tasya [4]

Answer: Virtual desktop infrastructure

Explanation:

The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system)  is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.

The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.

All the other options does not involve with this technology so that is why option (D) is correct.

4 0
3 years ago
What is syntax?
kkurt [141]

Answer:

A

Explanation:

5 0
3 years ago
4
kupik [55]

Answer:

the answer is D Smart Object

5 0
3 years ago
Read 2 more answers
O How basic blocks are identified and how the blocks are used to construct control flow graphs
OLEGan [10]

Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Note that  Basic Block is said to be a composition  of statements that is known to be one that often always executes one after other, and this is often done in a sequence.

<h3>How do you create a flow graph from the basic blocks?</h3>

Flow graph  is gotten by:

  • Lets Block B1 be the initial node and also Block B2 will tend to follows B1, so from B2 to B1 there is seen a kind of an edge.

Note that the first task is for a person to partition a sequence of three-address code and this is done into basic blocks.

Hence, Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Learn more about basic blocks from

brainly.com/question/132319

#SPJ1

5 0
2 years ago
In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
Solnce55 [7]
Up to 24 bits can be used to identify unique <span>networks.</span>
5 0
3 years ago
Other questions:
  • The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.
    11·1 answer
  • Page orientation can be either landscape or _____.
    13·1 answer
  • A _____ is a machine that changes information from one form into another.
    7·1 answer
  • Select all the items that determine your preference for a concert ticket. a) band that is playing b) date of the concert c) pric
    7·1 answer
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • Advantages of Linux include_____.
    6·1 answer
  • Delete temp or %temp% files in Windows 10 is safe and, can it help boost up your PC fps?
    5·1 answer
  • Interest on loan paid to sangam stores Rs5000(journal entry)​
    13·1 answer
  • Define the term loop rule.
    13·1 answer
  • How do I make my header line visible?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!