1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
3 years ago
6

You have been assigned to design the database for a new soccer club. Indicate the most appropriate sequence of activities by lab

eling each of the following steps in the correct order. (For example, if you think that "Load the database" is the appropriate first step, label it "1.")
__________ Create the application programs.

__________ Create a description of each system process.

__________ Test the system. Load the database.

__________ Normalize the conceptual model.

__________ Interview the soccer club president.

__________ Create a conceptual model using ER diagrams.

__________ Interview the soccer club director of coaching.

__________ Create the file (table) structures.

__________ Obtain a general description of the soccer club operations.

__________ Draw a data flow diagram and system flowcharts.
Computers and Technology
1 answer:
lara [203]3 years ago
7 0

Answer:

The solution of this question is given below in the explanation section.

Explanation:

To design a database for a new soccer club, the following sequence of activities will be carried out.

_____8_____Create the application programs.

_____4_____ Create a description of each system process.

_____9_____ Test the system. Load the database.

____7______ Normalize the conceptual model.

___1_______ Interview the soccer club president.

___6_______ Create a conceptual model using ER diagrams.

___2_______ Interview the soccer club director of coaching.

____7______ Create the file (table) structures.

____3______ Obtain a general description of the soccer club operations.

____5______ Draw a data flow diagram and system flowcharts.

The correct orders of activities the to design a soccer club database is given below:

  1. Interview the soccer club president.
  2. Interview the soccer club director of coaching.
  3. Obtain a general description of the soccer club operations.
  4. Create a description of each system process.
  5. Draw a data flow diagram and system flowcharts.
  6. Create a conceptual model using ER diagrams.
  7. Create the file (table) structures.
  8. Normalize the conceptual model.
  9. Create the application program
  10. Test the system. Load the database.
You might be interested in
____ returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.
Gemiola [76]

Answer:

<u>vecCont.capacity()</u> returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.

Explanation:

Consider the provided information.

vecCont.capacity() is a function that returns the maximum number of elements(without reallocation) that can be inserted into the container.

<u>vecCont.capacity()</u> returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.

6 0
3 years ago
You work in a classified environment where Bell LaPadula MLS (Multilevel Security) model is employed. Your clearance is "SECRET"
kumpel [21]

Answer:

The answer is by using a covert channel like shared memory objects such as files, directories,messages, etc since both  the user and the sender of the document are on same network of the company.

Explanation:

The Bell LaPadula MultiLevel Security model was a security policy developed by Bell and LaPadula in 1973 in response to a security issue raised by the US Air Force regarding file-sharing mainframe computers . Actually, many people with networked systems have realized by early 1970s that the protection purportedly offered by many commercial operating systems was poor, and wa not getting better any time soon. This was observed when it was noticed that as one operating system error was fixed, some other vulnerability would be discovered. There was also the constant worry that various unskilled users would discover loopholes in the operating system during usage and use them to their own advantage.

 Information release may take place via shared memory objects such as files, directories, messages, and so on. Thus, a Trojan Horse acting on behalf of a user could release user-private information using legitimate operating system requests. Although developers can build various mechanisms within an operating system to restrict the activity of programs (and Trojan Horses) operating on behalf of a user  , there is no general way, short of implementing nondiscretionary policy models, to restrict the activity of such programs. Thus, given that discretionary models cannot prevent the release of sensitive information through legitimate program activity, it is not meaningful to consider how these programs might release information illicitly by using covert channels.

For example, for someone with higher integrity level (SECRET) to send an accounts payable application to a user, if the untrusted accounts payable application contains a Trojan Horse, the Trojan Horse program could send a (legal) message to the said user process running at a lower integrity level (CONFIDENTIAL), thereby initiating the use of a covert channel. In this covert channel, the Trojan Horse is the receiver of (illegal) lower integrity-level input and the user process is the sender of this input.

7 0
3 years ago
Simplify the expresion<br>12. 12g + 9g​
Lerok [7]
12g + 9g simplified is 21g
7 0
3 years ago
Meteoroids are small space rocks. They are usually pieces of asteroids or comets. Meteoroids orbit the sun like asteroids and co
Angelina_Jolie [31]
B is your answer meteoroids are small space rocks they are usually pieces of asteroids or comets
4 0
2 years ago
Regulatory and informational markers are easily identified through which features
Darina [25.2K]
Regulatory or informational markers are utilized to inform you with respect to circumstances, threats, or headings. They may show reefs, swim territories, speed zones, and so forth. They can be effectively distinguished by the orange groups on the top and base of each float.
3 0
3 years ago
Other questions:
  • Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'
    14·1 answer
  • How do you add text to a blank slide layout?
    5·2 answers
  • Which area of physics governs wireless communication?
    10·2 answers
  • Are headphones considered a computer? Why or why not?
    13·2 answers
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • Describe safe motherhood​
    9·2 answers
  • Help with this quiz question thank you!
    12·2 answers
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • Which of the following is an advantage of using variables?
    9·1 answer
  • If a friend gave a used Wii disc to someone, and they put it in their Wii, could they play it? Nintendo Switch games can only be
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!