The String data type is most suitable to define a password field.
Answer:
The ER Diagram is in the attachment. And I an including the membership details in the use case:
Applicants: Coach will ask for iD.
if the application is not registered, coach sends to registration department.
Applicants registers-->> shows registration ID-->> goes to account section
Submits the fee->> goes to coach again-->>coach asks for fee sjip-->> On yes-->> entrance allowed else-->> sent to account section
Applicants apply for course-->>if prerequisite is met, registration allowed
else-->>registration denied
Note: If registration is allowed the applicant is sent to account section and
Also note:
First check, then registration, then course prerequisite check,then account->entrance
If registered->direct entry.
Explanation:
The answer is self explanatory.
Answer:
Sometimes annoying people get bored and decide to report random things for no reason. it sucks. sometimes people accidentally press the report button when they didn't mean to, I did that once and i felt really bad. There should be a "are you sure you want to report this" button when you hit the report button. It would help.
Explanation:
Answer:
A. file locking.
Explanation:
File locking in computer technology is a data management mechanism used by software developers to completely restrict access of other users to a software program or computer file by granting permissions to only one user who can delete, modify or edit the application program at any point in time. This simply means that in the software development life cycle (SDLC), file locking is used to avoid interceding update on a particular software by restriction of other users while it's being modified by another user.
For instance, if two users (Gina and Mike) open the same software program, Gina then proceed to modify and save the changes. If Mike also modifies the software program and saves it, this would overwrite Gina's update. Hence, in order to prevent this type of conflict in software development, it is highly recommended that a file locking mechanism is adopted.
<em>This ultimately implies that when Gina make changes to a file, no one else is allowed to access the file because a file locking mechanism is being used by Gina's company as a version control process. </em>
Is it where you can pick multiple answers