1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
3 years ago
9

The software maintains and manages information related to employees, rooms, committees, and committee meetings of a company. The

information
include at least the following data:

1. Employee: IDNumber, Full Name, Office Location, Telephone Number, Department, and Position.
2. Employee’s Schedule: Date, Start Time, End Time, and Task .
3. Room: Building Number, Room Number, and Capacity.
4. Room Schedule: Date, Start Time, End Time, and Status.
5. Committee: Title, Chair’s Name , Chair’sIDNumber, and Members.
6. Committee Meeting: Meeting Number, Date, Start Time, and End Time.

Computers and Technology
1 answer:
artcher [175]3 years ago
8 0

The software maintains and manages information related to employees, rooms, committees, and committee meetings of a company

Explanation:

  • Below is the ER diagram to represent the employee database.
  • It shows the relationship between the various sectors.

You might be interested in
Why is information so important in our lives
GREYUIT [131]
Information is very important because it helps us as a society make decisions. Decisions are impossible without information, and we are constantly seeking information in everything we do. Information is important in decreasing our sense of doubt and uncertainty as well.
5 0
3 years ago
Read 2 more answers
Which remarketing audiences can be defined in google analytics? (select all that apply)?
Harman [31]
<span>The remarketing audiences that can be defined in google analytics are :      </span><span>
1) Users who played a video on your website
2) Users who purchased a product on your website
</span>3) Users who visited a specific page on your website
3 0
3 years ago
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
Technological advances have led to worldwide increased ______.
kumpel [21]

Answer:

C

Explanation:

4 0
3 years ago
Read 2 more answers
Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the int variable
levacccp [35]

Answer:

if (pH<7.0){

          neutral=0;

          base=0;

          acid=1;

      }

      else if (pH>7.0){

          neutral=0;

          base=1;

          acid=0;

      }

      else if (pH==7.0){

          neutral=1;

          base=0;

          acid=0;

      }

Explanation:

As required by the question, if and else statements have been used to test the value of the pH and assign the apropriate values to the variables neutral, base and acid.

The code snippet below can be used to prompt the user to enter values for pH

<em>import java.util.Scanner;</em>

<em>public class pHTest {</em>

<em>   public static void main(String[] args) {</em>

<em>      Scanner scr = new Scanner(System.in);</em>

<em>       System.out.println("Enter a value for the pH");</em>

<em>       int neutral, base, acid;</em>

<em>       double pH = scr.nextDouble();</em>

<em> if (pH<7.0){</em>

<em>           neutral=0;</em>

<em>           base=0;</em>

<em>           acid=1;</em>

<em>       }</em>

<em>       else if (pH>7.0){</em>

<em>           neutral=0;</em>

<em>           base=1;</em>

<em>           acid=0;</em>

<em>       }</em>

<em>       else if (pH==7.0){</em>

<em>           neutral=1;</em>

<em>           base=0;</em>

<em>           acid=0;</em>

<em>       }</em>

<em>} }</em>

4 0
4 years ago
Read 2 more answers
Other questions:
  • How to remove info from a broken laptop and transfer?
    5·1 answer
  • Radio waves pros and cons
    10·2 answers
  • The Internet has its roots in a network that became functional in 1969, linking scientific and academic researchers across the U
    10·1 answer
  • (TCO 4) What will the following program segment display? int funny = 7, serious = 15; funny = serious % 2; if (funny != 1) { fun
    14·2 answers
  • Which of the following is not a true statement? a. Data flow diagrams and flowcharts are difficult to prepare and revise using s
    10·1 answer
  • What type of micro sd card is needed for this type of MP3 player? I tried searching it up and a bunch came up. I don’t know whic
    7·1 answer
  • Digital security measures include _____. Select 2 options.
    11·2 answers
  • 5. Which one of these can connect directly to the internet?
    9·2 answers
  • How to find HCF and LCM of a number in Q Basic program?? ​
    5·1 answer
  • Your client Mr. Smith has requested a reservation at Eleven Madison Park this evening for a party of 2 at 6PM. Unfortunately, th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!