1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
7

How do I do this? I know the shapes and everything but how do I do b, d, and e?

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
4 0
Look in google for math flowcharts...it will appear easily.
You might be interested in
Modern fax machines use _______ to transmit text.
KatRina [158]
Modern fax machines use senors to transmit text.
hope this helps:)
3 0
4 years ago
Read 2 more answers
Consider an ERD for a beauty salon in which there is a superclass entity EMPLOYEE with four subclasses:
julsineya [31]

Answer:

Partial and disjoint

Explanation:

Since there is overlapping in relationship of HAIR_STYLIST and MANAGER it can't be tree structure.

A MANAGER can or can't be HAIR_STYLIST. In order for the relationship to be multiple inhertiance am entity in sub-class has to be union of all subclasses

In single inheritance, a sub-class has to be a union of a single super class.

In partial and disjoint, some entity in super class may or may not be related to a sub-class.

5 0
3 years ago
Advantages of practicing safety in the information communication technology laboratory​
Svetllana [295]
Information communication technology (ICT) is a crucial tool to support effective communication and decision-making under complex and uncertain environments of disasters by enhancing cognitive capacity of emergency managers. With the continuous influence and evolution of communication technologies, information sharing and decision-making has drastically changed and affects each phase of emergency management. Researchers continue to investigate the relationship of human involvement for spreading public safety information through ICT. With each disaster holding diverse characteristics influencing prediction, detection, and specific activities required for prevention, mitigation, response and recovery, the need for interoperable and dependable communication infrastructure, a common operating picture, and supportive regulations, policies, and practice greatly increases. Although a national public safety communication system was proposed, there are implementation challenges between local, state, and federal agencies. This paper briefly examines the evolution of the use of ICT for public safety along with current trends, benefits and challenges, and future needs.
4 0
3 years ago
_____________ is the process of inspecting data that has been input to a program to make sure it is valid before it is used in a
Maksim231197 [3]

Answer: E) Input validation

              C) Data validation

Explanation:

  • Input validation is the process of analyzing and testing input's quality and correctness that are being processed at further level in information system.It help in eliminating any type of improper or informal input data from getting supplied to user or program in a system.
  • Input validation is also known as data validation.As the input that is being tested and validated is form of data that is going through cleansing task to remove useless data.
  • According to the question, data and input are being inspected to extract the validity and correctness of it before sending it for computation .Thus , both data and input validation is happening in this case.
  • Other options are incorrect because testing is examining the data.Correction data and input is the step for rectifying the mistakes in data or input.
  • Thus, the correct option is option(C) and (E).

4 0
4 years ago
In the context of the database design process, the conceptual design step that defines the fragmentation and allocation strategy
cluponka [151]
In the context of the database design process, the conceptual design step that defines the  fragmentation and allocation strategy is the database design flashcards. The distributed data base design problem is presented that involve a development of a global model ; a fragmentation and a  data allocation.
4 0
3 years ago
Other questions:
  • Why should the government create money it doesn’t have?
    5·2 answers
  • Would you expect all the devices listed in bios setup to also be listed in device manager? would you expect all devices listed i
    7·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • What are 5 ways we can reduce our energy?
    5·1 answer
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    7·1 answer
  • The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
    15·2 answers
  • How ssd is better than normal sata and pata HDD​
    11·1 answer
  • Whenever I rate an answer to a question, it says so and so finds it helpful. It's always the same people that they say find it h
    10·1 answer
  • What is denial service attack?
    14·2 answers
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!