1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
4 years ago
5

Identify the feature of a NoSQL database that allows a large database to be distributed across thousands of servers running the

same NoSQL database management system. Select one: a. Deduplication b. Scalability c. Integrity d. Authenticity
Computers and Technology
1 answer:
Anna35 [415]4 years ago
5 0

Answer: Option B : Scalability

Explanation: NoSQL was developed to scale up systems by not upgrading the existing hardware but by removing the slow system response that occurs in RDBMS for large volume of data. NoSQL database is non-relational, this makes scaling out better than relational databases as they are designed with web applications from development.

Highlights of features of NoSQL

- Non - Relational

- Schema free

- Simple API

- Distributed.

You might be interested in
What do you enter at the command prompt to prevent the shell from using to much of the systems resources?
kap26 [50]

Answer:

Ulimit is the correct answer for the above question.

Explanation:

The Linux operating system is a system on which a user can work on multiple programming system. If a user is working on multiple programs then he needs to set the limit for the system resources so that the system can not access so many resources for any particular program and he can able to access multiple programs. For this a user needs to use the Ulimit command which syntax is as follows--

ulimit [-A] (Where A can be any of them (a, b, c, d, e, f, H, i, l, m, n, p, q, r, s, S, t, T, u, v, x) which refers the type of and units of resources.)

The question asked about the command which is used to prevent to use many of the system resources, then the answer is Ulimit command which is described above.

3 0
3 years ago
Which of the following statements about light emitting in diodes is correct
andriy [413]

<span>The options attached to the question above are as follows:</span>

<span>
A. Light-Emitting diodes are used as indicators in circuits

B. Light-Emitting diodes are used as defectors in circuits

C. Light-Emitting diodes have very short life-spans in circuits

D. Light-Emitting diodes conduct current in either direction in circuits</span>

ANSWER

The correct option is A.

Light emitting diodes [LED] refers to a semi conductor diode that glows when current flows through it by converting electrical energy into light. LED has many applications and one of it is that is used as an indicator in electric circuits. The circuit symbol of LED is made up of two arrow marks, which is used to indicate the radiation that is emitted by the diode.

3 0
4 years ago
[1] Please find all the candidate keys and the primary key (or composite primary key) Candidate Key: _______________________ Pri
AVprozaik [17]

Answer:

Check the explanation

Explanation:

1. The atomic attributes can't be a primary key because the values in the respective attributes should be unique.

So, the size of the primary key should be more than one.

In order to find the candidate key, let the functional dependencies be obtained.

The functional dependencies are :

Emp_ID -> Name, DeptID, Marketing, Salary

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

Course_ID -> Course Name

Course_Name ->  Course_ID

Date_Completed -> Course_Name

Closure of attribute { Emp_ID, Date_Completed } is { Emp_ID, Date_Completed , Name, DeptID, Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { Name , Date_Completed } is { Name, Date_Completed , Emp_ID , DeptID, Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { DeptID, Date_Completed } is { DeptID, Date_Completed , Emp_ID,, Name, , Marketing, Salary, Course_Name, Course_ID}

Closure of attribute { Marketing, Date_Completed } is { Marketing, Date_Completed , Emp_ID,, Name, DeptID , Salary, Course_Name, Course_ID}.

So, the candidate keys are :

{ Emp_ID, Date_Completed }

{ Name , Date_Completed }

{ DeptID, Date_Completed }

{ Marketing, Date_Completed }

Only one candidate key can be a primary key.

So, the primary key chosen be { Emp_ID, Date_Completed }..

2.

The functional dependencies are :

Emp_ID -> Name, DeptID, Marketing, Salary

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

Course_ID -> Course Name

Course_Name ->  Course_ID

Date_Completed -> Course_Name

3.

For a relation to be in 2NF, there should be no partial dependencies in the set of functional dependencies.

The first F.D. is

Emp_ID -> Name, DeptID, Marketing, Salary

Here, Emp_ID -> Salary ( decomposition rule ). So, a prime key determining a non-prime key is a partial dependency.

So, a separate table should be made for Emp_ID -> Salary.

The tables are R1(Emp_ID, Name, DeptID, Marketing, Course_ID, Course_Name, Date_Completed)

and R2( Emp_ID , Salary)

The following dependencies violate partial dependency as a prime attribute -> prime attribute :

Name -> Emp_ID

DeptID -> Emp_ID

Marketing ->  Emp_ID

The following dependencies violate partial dependency as a non-prime attribute -> non-prime attribute :

Course_ID -> Course Name

Course_Name ->  Course_ID

So, no separate tables should be made.

The functional dependency Date_Completed -> Course_Name has a partial dependency as a prime attribute determines a non-prime attribute.

So, a separate table is made.

The final relational schemas that follows 2NF are :

R1(Emp_ID, Name, DeptID, Marketing, Course_ID, Course_Name, Date_Completed)

R2( Emp_ID , Salary)

R3 (Date_Completed, Course_Name, Course_ID)

For a relation to be in 3NF, the functional dependencies should not have any transitive dependencies.

The functional dependencies in R1(Emp_ID, Name, DeptID, Marketing, Date_Completed) is :

Emp_ID -> Name, DeptID, Marketing

This violates the transitive property. So, no table is created.

The functional dependencies in R2 (  Emp_ID , Salary) is :

Emp_ID -> Salary

The functional dependencies in R3 (Date_Completed, Course_Name, Course_ID) are :

Date_Completed -> Course_Name

Course_Name   ->  Course_ID

Here there is a transitive dependency as a non- prime attribute ( Course_Name ) is determining a non-attribute ( Course_ID ).

So, a separate table is made with the concerned attributes.

The relational schemas which support 3NF re :

R1(Emp_ID, Name, DeptID, Course_ID, Marketing, Date_Completed) with candidate key as Emp_ID.

R2 (  Emp_ID , Salary) with candidate key Emp_ID.

R3 (Date_Completed, Course_Name ) with candidate key Date_Completed.

R4 ( Course_Name, Course_ID ).  with candidate keys Course_Name and Course_ID.

6 0
4 years ago
Leo noticed that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi protected
kakasveta [241]

Answer:

It is called a WPS brutal force attack.

Explanation:

Wired and wireless networks are both susceptible to attacks. The wired network, the advantage as a cable connection, is more secure than wireless networks, but wireless network also have security measures like the wifi protected set up (WPS).

WPS is used to connect to a network without passphrase, but with a key combination or a PIN.

Brutal force attacks are used on WPS to forcefully generate the PIN, using a third party software.

3 0
3 years ago
Many clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situati
xeze [42]

Answer:

The list of those two situations is given below.

Explanation:

<u>Case 1:</u>

Yet another condition for manual cluster formation that wasn't an improvement would be whenever the number of observations measured is higher than even the machine can accommodate.  

<u>Case 2:</u>

The second scenario which isn't an improvement whenever the original data is recognized for automated cluster analysis, and therefore also implementing the algorithms doesn't generate any extra details.

4 0
3 years ago
Other questions:
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • To provide both encryption and integrity protection, wpa2 uses aes encryption with:
    12·1 answer
  • You notice your glove is torn; what should you do
    14·2 answers
  • Which setting is used to determine the order of printing pages?
    15·1 answer
  • To use appropriate personal protective equipment we should​
    12·1 answer
  • What are the examples of debugging?​
    14·1 answer
  • Which statements about grades are accurate? Check all that apply. Grades help indicate how well a student is understanding a cer
    13·1 answer
  • You are about to repair and change the resistor (small components),but the components are too small to solder and hold,what tool
    12·1 answer
  • Which is the correct process for selecting consecutive rows in a worksheet?
    9·1 answer
  • A computer lacks a division instruction and performs iteratively using the technique described on page 300. suppose we wish to e
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!