1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
4 years ago
6

You have been assigned to design the database for a new soccer club. Indicate the most appropriate sequence of activities by lab

eling each of the following steps in the correct order. (For example, if you think that "Load the database" is the appropriate first step, label it "1.")
__________ Create the application programs.

__________ Create a description of each system process.

__________ Test the system. Load the database.

__________ Normalize the conceptual model.

__________ Interview the soccer club president.

__________ Create a conceptual model using ER diagrams.

__________ Interview the soccer club director of coaching.

__________ Create the file (table) structures.

__________ Obtain a general description of the soccer club operations.

__________ Draw a data flow diagram and system flowcharts.
Computers and Technology
1 answer:
lara [203]4 years ago
7 0

Answer:

The solution of this question is given below in the explanation section.

Explanation:

To design a database for a new soccer club, the following sequence of activities will be carried out.

_____8_____Create the application programs.

_____4_____ Create a description of each system process.

_____9_____ Test the system. Load the database.

____7______ Normalize the conceptual model.

___1_______ Interview the soccer club president.

___6_______ Create a conceptual model using ER diagrams.

___2_______ Interview the soccer club director of coaching.

____7______ Create the file (table) structures.

____3______ Obtain a general description of the soccer club operations.

____5______ Draw a data flow diagram and system flowcharts.

The correct orders of activities the to design a soccer club database is given below:

  1. Interview the soccer club president.
  2. Interview the soccer club director of coaching.
  3. Obtain a general description of the soccer club operations.
  4. Create a description of each system process.
  5. Draw a data flow diagram and system flowcharts.
  6. Create a conceptual model using ER diagrams.
  7. Create the file (table) structures.
  8. Normalize the conceptual model.
  9. Create the application program
  10. Test the system. Load the database.
You might be interested in
The emergence of MP3 (iPod) technology is an example of creative destruction because a. It is less expensive than compact discs
Katen [24]

Answer:

The emergence of MP3 (iPod) technology is an example of creative destruction because it has b. Replaced compact discs as a technology used for the storage and transfer of music.

Explanation:

Creative destruction refers to the process whereby a new technology/product replaces the one before it. The MP3 technology replaced compact discs because people started using MP3 files to transfer and store music since it was less expensive and files could be transferred easily. MP3 files could be transferred over Bluetooth and they required less storage space. Whereas, a compact disc required more space and costed more as well. So, MP3 technology replaced compact discs.

The emergence of MP3 (iPod) technology is an example of creative destruction because it has b. Replaced compact discs as a technology used for the storage and transfer of music.

8 0
3 years ago
write a program that inserts on the p position of a string read from the keyboard also another string read from the keyboard
vovangra [49]

Answer:

px

Explanation:

6 0
3 years ago
What are the differences and similarities of computer virus and biological virus. Give 4 examples
Papessa [141]

Answer:

During recent months, we’ve witnessed an unexpected and distressing pandemic of a coronavirus disease. What I find especially distressing about it is how the worldwide adversity was caused by just a tiny thing — namely, a virus called SARS-CoV-2.

However, biological viruses have always been a potent threat to humanity, as historic pandemics have proved. No wonder viruses became an ideal weapon model in a totally different world — a world of programming. The first computer viruses were created as early as in the 1970s. Starting as pranks, they evolved to become a major threat to the stability of computer networks worldwide. And the more I think of viruses, both biological and digital, the more amazed I am by their similarities.

We don’t know what kind of challenges viruses of either type will cause in the future, but understanding how they infect, the symptoms they induce, how they spread, and the damage they can cause can help us fight both.

The Common Thread

Let’s start with the basics: What does a virus look like?

computer virus of 1999

Click image for larger version

Figure 1: Pictured on the left is an electron microscope image of SARS-CoV-2 particles - the pandemic-causing coronavirus. Source: NIAID-RML. Pictured on the right is a code snippet of a Melissa, the notorious email-spreading computer virus of 1999. Source: Gizmodo.

The images in Figure 1 might look vastly different, but, essentially, they’re the same: a string of code. In the coronavirus, it’s the RNA genome in a shell; in Melissa, it’s computer code. In both cases, the code is an “instruction” for the virus to follow.

Explanation:

here is your answer hope you will enjoy

thank you

6 0
3 years ago
good information is characterized by certain properties. List and explain these characteristics of good information​
Gelneren [198K]

Answer:

here is your ans

Explanation:

Characteristics of good quality information can be defined as an acronym ACCURATE. These characteristics are interrelated; focus on one automatically leads to focus on other.

Accurate

Information should be fair and free from bias. It should not have any arithmetical and grammatical errors. Information comes directly or in written form likely to be more reliable than it comes from indirectly (from hands to hands) or verbally which can be later retracted.

Complete

Accuracy of information is just not enough. It should also be complete which means facts and figures should not be missing or concealed. Telling the truth but not wholly is of no use.

Cost-beneficial

Information should be analysed for its benefits against the cost of obtaining it. It business context, it is not worthwhile to spend money on information that even cannot recover its costs leading to loss each time that information is obtained. In other contexts, such as hospitals it would be useful to get information even it has no financial benefits due to the nature of the business and expectations of society from it.

User-targeted

Information should be communicated in the style, format, detail and complexity which address the needs of users of the information. Example senior managers need brief reports which enable them to understand the position and performance of the business at a glance, while operational managers need detailed information which enable them to make day to day decisions.

Relevant

Information should be communicated to the right person. It means person which has some control over decisions expected to come out from obtaining the information.

Authoritative

Information should come from reliable source. It depends on qualifications and experience and past performance of the person communicating the information.

Timely

Information should be communicated in time so that receiver of the information has enough time to decide appropriate actions based on the information received. Information which communicates details of the past events earlier in time is of less importance than recently issued information like newspapers. What is timely information depends on situation to situation. Selection of appropriate channel of communication is key skill to achieve.

Easy to Use

Information should be understandable to the users. Style, sentence structure and jargons should be used keeping the receiver in mind. If report is targeted to new-comer in the field, then it should explain technical jargons used in the report.

4 0
3 years ago
At what x position are the ellipses drawn??? thanks ♡​
Anna71 [15]

Answer:

55

Explanation:

The xPos variable is set to 55 and they have set the variable in the code for the ellipses in the x position

Hope this helps

7 0
3 years ago
Other questions:
  • Emma opened a new document a Microsoft word and typed her assignment. She is now planning to save the documents for the first ti
    11·1 answer
  • Which of the following is an encryption tool that allows users to encrypt files and folders by simply right-clicking a given obj
    8·1 answer
  • How would you describe by adding comments to the coding explaining that you know what int num1 = 10; int ave = (num1+num2+num3)/
    10·1 answer
  • Type of media that uses laser technology to store data and programs is
    6·1 answer
  • You are trying to access the Wi-Fi network at a coffee shop. What protocol will this type of wireless networking most likely use
    11·1 answer
  • _____ involves storing data and running applications outside the company’s firewall. answer grid computing parallel computing cl
    11·1 answer
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the
    5·1 answer
  • What does a converter do? A. It converts one technological system into another. B. It converts one type of electrical signal int
    10·2 answers
  • PLEASE HELP THIS IS DUE TODAY!! WILL MARK BRAINLIEST!!
    13·2 answers
  • You’ve been hired to help a bank automate their deposit/withdrawal system! Your task is to write a Python program that interacts
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!