1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
3 years ago
9

The software maintains and manages information related to employees, rooms, committees, and committee meetings of a company. The

information
include at least the following data:

1. Employee: IDNumber, Full Name, Office Location, Telephone Number, Department, and Position.
2. Employee’s Schedule: Date, Start Time, End Time, and Task .
3. Room: Building Number, Room Number, and Capacity.
4. Room Schedule: Date, Start Time, End Time, and Status.
5. Committee: Title, Chair’s Name , Chair’sIDNumber, and Members.
6. Committee Meeting: Meeting Number, Date, Start Time, and End Time.

Computers and Technology
1 answer:
artcher [175]3 years ago
8 0

The software maintains and manages information related to employees, rooms, committees, and committee meetings of a company

Explanation:

  • Below is the ER diagram to represent the employee database.
  • It shows the relationship between the various sectors.

You might be interested in
Write an HTML document which contains two text fields, a button, and a div. The first text field should be labeled “Temperature”
disa [49]

Answer:

I created a jsfiddle for this: https://jsfiddle.net/tonb/o7uv4cdm/26/

Explanation:

see jsfiddle.

The usual html and body tags are omitted for simplicity. For your stand-alone page you'll have to put them in, as well as additional tags for your inline scripting.

5 0
4 years ago
Help me code plz i using python language on laptop please answer or comment if u want to help
dybincka [34]

Answer:

What is the question you have?

Explanation:

7 0
3 years ago
What countermeasures would you recommend to defend against routing attacks?
Alla [95]

Answer:

 The countermeasure is basically recommended against the attackers for defending various routing attacks. Routing is one of the most generally assaulted segments in a system and a lot of system the executives work centers around checking conduct of switches.

The single router has more than one unit for bundle handling. This encourages quicker handling. This preparing unit is finished programming which can be undermined by an aggressor.

So an additional free equipment is implanted into the switch which can do observing to recognize the product assaults. Maintain a strategic distance from over composition the addresses.

Be movement at time when all of a sudden if anything incorrectly happens we should be in a situation to deal with and deal with the issue since it causes more harm when time runs.

3 0
3 years ago
Which of the following is an example of plagiarism? A. Listing someone as an author who did not actually contribute to the publi
Nata [24]

Answer:

C. <em>Presenting someone else’s ideas or words and claiming them as one's own.</em>

Explanation:

The correct option is <em>C. Presenting someone else’s ideas or words and claiming them as one's own. </em>

The definition of <em>Plagiarism </em>indicates that stealing and passing off ideas or words created and / or developed by others and pretending or signifying that such words or ideas are one´s one is considering an act of plagiarism.

3 0
3 years ago
modern managed cloud service providers will often use secure keyboard/video/mouse (kvm) devices within their data centers. these
professor190 [17]

A cloud service providers uses KVM in their data centers because they are gravely concerned with insider threats.

KVM is a system for management, monitoring and control of a data center environment from a central location. In the data center this system is very necessary because the data center has multiple servers and computers. With this system the server can be connected and controlled from a remote location. This includes mapping the physical locations of accessible virtual drives.

Your question is incomplete, but most probably you full question was:

Modern managed cloud service providers will often use secure Keyboard/Video/Mouse (KVM) devices within their data centers. these devices are extremely expensive compared to their non-secured counterparts. which of the following is one of the reasons cloud service providers do this?

  • They have plenty of revenue and can afford it
  • They are gravely concerned with insider threats
  • Cloud data centers need very few of these devices
  • Managed cloud providers often manufacture their own devices as well

Learn more about servers brainly.com/question/27960093

#SPJ4

7 0
1 year ago
Other questions:
  • Timing circuits are a crucial component of VLSI chips. Here’s a simple model of such a timing circuit. Consider a complete balan
    10·1 answer
  • Suppose you have a 12-hour clock on a very fancy chair (noon is 12 PM and midnight is 12 AM). Write a C++ program that reads in
    7·1 answer
  • Using the drop-down menus, correctly complete the sentences.
    5·2 answers
  • The smallest network
    13·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • What are the five types of alignment in Word?
    12·2 answers
  • In this lab you are asked to declare two variables of type integer: userNum and x. The user should input should be stored using
    8·1 answer
  • If an image has only 4 colors, how many bits are necessary to represent one pixel’s color? Describe a new custom encoding that u
    8·1 answer
  • What is this app for ?
    10·2 answers
  • Which communication network pattern offers a fairly even flow of information, but two people interact with only one other?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!