1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dimas [21]
3 years ago
12

A case competitions database:You work for a firm that has decided to sponsor case competitions between teams of college business

students, and you were put in charge of creating a database to keep the corresponding data. The firm plans to hold about dozens of different regional competitions at various dates that will take place at different branches around the country. For each competition, you need to store a name, date, and the name of the branch where it is going to take place. For each college that has agreed to participate in the competition, you need to store the college name, a contact phone number, and a contact address. Each college can participate in only one competition, and the database should know which competition each college is participating in. On the other hand, each college is allowed to send more than one team to its competition. Each team gives itself a name and a color, and consists of several students of the same college; for each student, you want to store a first name, last name, date of birth, major, and expected graduation date. Question: How many tables do you need
Computers and Technology
1 answer:
Strike441 [17]3 years ago
3 0

Answer:

We will ned (4) four tables.

Explanation:

For the given scenario we will have to build a relational database. The database will have four tables i.e. Competation, Collage, Team and student.

For each table the database fields are mention below. Note that foreign keys are mentioned in itallic.

Competition:

Competition_ID, Competition_Name, Competition_Data, Competition_Name _of_Branch, <em>College_ID</em>

<em />

Collage:

Collage_ID, Collage_Name, Collage_Contact, Collage_address

Team:

Name, Color, <em>Team_ID, College_ID, Competition_ID</em>

<em />

College:

Student_ID, First_Name, Last_Name, Date_of_Birth, Major, Expected_Gradiuation_Date, <em>Collage_ID, Team_ID, Competation_ID</em>

You might be interested in
Interest rate risks would be most relevant to what purchase?
Yuri [45]

I'd say B) a house because interest rates can change and will affect you if you're paying for a mortgage, etc.. (Houses take a while to pay for; airline tickets, a sweater, and patio furniture is paid immediately)

6 0
3 years ago
Read 2 more answers
Can someone help me with this code please explain it to me in simple way
Ilia_Sergeevich [38]

Answer:

It prints your name and age.

Explanation:

It prints the value for both name and age variables, so you need away to get it.

5 0
2 years ago
Using the bitwise AND operation, the result of 1 AND 0 is ___________. 10100100 ___________ 11010101 = 01110001. A common way to
Ivanshal [37]

Using the bitwise AND operation, the result of 1 AND 0 is 0.

10100100 XOR 11010101 = 01110001.

A common way to detect whether a value is even or odd is to use the AND 1 operation to test if the least significant bit is set.

Combining multiple flags into a single variable can be accomplished via the OR operation.

6 0
3 years ago
A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?
Alexxx [7]

ANSWER:

The correct answer is Running Sum.

Explanation:

A report has a column of totals, with each total adding to the cell above it. Such type of calculated figure is called the Running Sum.

Running sum is also called the Partial Sum. In such type of summation, the values in the sequence is added to get a final result and then if a new number comes, it is again added to the grand sum, and in this way the sequence continues. Every new entry is added to the previous sum to get another sum.

3 0
3 years ago
Which of the following is true of two-factor authentication?
dybincka [34]

Answer: D)It relies on two independent proofs of identity.

Explanation: Two factor authentication is technique which uses two steps/stage for the verification or authentication.It is done for the extra security maintenance.IT is also known as 2FA. It consist of two different authentication component so that it penetrates through double protection layer .

Other options are incorrect because It RSA public key cannot be used for the authentication of private content. It does not use both hand geometry at same time for both the levels and It does not utilize only single sign-on technology. Thus, the correct option is option(D).

7 0
3 years ago
Other questions:
  • You want to know what directories in your account hold C files. You can use the command:______.
    9·1 answer
  • Why is television reactive, requiring no skills or thinking
    11·1 answer
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • A server, also called a(n) _______________, operating system is a multiuser operating system because it controls a central compu
    6·1 answer
  • Which small-group format would be most appropriate for the following situation? A large sporting event is coming to town. Key me
    14·2 answers
  • A company that provides finance services wants to shift to a mobile platform. What is the major advantage that the users of the
    10·2 answers
  • Solve(-8/3)+7/5 please answer​
    5·1 answer
  • 2ND LAST QUESTION
    13·1 answer
  • Is the flow of power reversible in a leadscrew?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!