1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
6

For each of the descriptions below, perform the following tasks:

Computers and Technology
1 answer:
zlopas [31]3 years ago
4 0

Answer:

Explanation:

The underlined traits in the ER chart speak to essential key since they remarkably recognize the quality  

(a)

(I) The level of the given relationship is 2 i.e it is a parallel connection among Book and Publisher. It is a one to numerous relationship from distributer to book in light of the fact that a distributer can distribute any number of books however a book will have only one publisher,so the cardinality will be 1 to 1..* (one to many)

(b)

(i) The degree of the given relationship is 2 i.e it is a binary relationship between Author and Book. It is a many to many relationship from Book to Author a book can be written by one or more authors and an author can write more than one book, so the cardinality will be 1..* to 1..* (many to many)

(c)

(i) As mentioned in part (b), the degree of given relation is 2 and cardinality is many to many (1..* to 1..*)

(d)

(i) The degree of the given relationship is 1 i.e unary relationship. It is a many to many relationship because one book can belong to any sets and a set can have any number of books, so cardinality is 1..* to 1..* (many to many)

Note: attached below is the image of various options to confirm the explanation (answer).

cheers i hope this helped !!!

You might be interested in
Which of the following is NOT correct concerning database design?
Alborosie

1 is not correct.

Hope this helps!

5 0
3 years ago
Which of the following controls computer memory?
Bogdan [553]
Operation system (OS)
4 0
2 years ago
Describa las etapas del arranque de viruta
blondinia [14]

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

7 0
2 years ago
10 Ejemplos de Software de Sistema. AYUDENME POR FAVOR SE LOS SUPLICO
bearhunter [10]

Answer:

MacOS, Linux, Android, Microsoft Windows, software de ciencia computacional, motores de juegos, automatización industrial y aplicaciones de software como servicio.

:-) (-:

6 0
2 years ago
Reusing internal and external components and behaviors maintains a consistent approach
boyakko [2]

<u>Reuse:</u> reusing internal and external components and behaviors maintains a consistent approach.

<h3>What is an e-waste?</h3>

An e-waste is the abbreviation for electronic waste and it can be defined as any electrical or electronic device that have been discarded because they are no longer functional and useful.

This ultimately implies that, e-waste are generally destined for disposal, resale, reuse, refurbishment, or recycling in the long run.

However, the burning of wires from e-waste extracts the following toxic components that are hazardous to human health:

Polybrominated flame reta-rdants

  • Mercury
  • Lead
  • Barium
  • Cadmium

Read more on recycling here: brainly.com/question/25024898

#SPJ1

8 0
1 year ago
Other questions:
  • How can you best utilize CSS for Web Development?
    6·1 answer
  • I’m order to protect your passwords, don’t use easy-to-guess information, don’t share your passwords, and NEVER change your pass
    13·1 answer
  • True or false?
    13·1 answer
  • What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
    13·1 answer
  • Use the drop-down menus to complete the steps to share a presentation through OneDrive.
    6·1 answer
  • What is the output of the following code:
    12·1 answer
  • 1. Which one of the following is true about screening interviews?
    7·1 answer
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
  • A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
    5·1 answer
  • Given a number n, for each integer i in the range from 1 to n inclusive, print one value per line as follows:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!