1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11111nata11111 [884]
3 years ago
6

A(n) ____ join will select only the rows with common values in the common attribute(s).

Computers and Technology
1 answer:
user100 [1]3 years ago
4 0

Answer:

The answer to the given question is "Natural".

Explanation:

Join is part of the SQL. Which stands for a Structured Query Language. In the join, two tables are joined. In this join common columns that have the same name in both the tables. In this question, the answer is natural join because in the natural join we select only rows with the common values in common attributes.

You might be interested in
How do computers perform complicated tasks built from simple instructions?
wlad13 [49]
They use and perform a set of actions and programs that build on each other.
8 0
3 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
Can someone please help me write a code for this
Anon25 [30]
When in doubt, decompose (break into smaller parts) the problem!

You need to display a GUI.
You need to accept input from two widgets and convert it integers.
You need to add a range of numbers.
You need to concatenate a string of what you're doing with the addition.
You need to display an answer in a widget and maybe redraw the window.

I've been having success copying the assignment into my source file and decomposing it as comments to frame out my program.
5 0
4 years ago
Essay about evolution of media shaped the values and norms of the society
snow_lady [41]

Answer:

Find the essay below.

Explanation:

Media refers to the several ways in which information is communicated to people in mass. Some channels through which such pieces of information are conveyed include; the newspapers, internet, television. The advent of media can be traced backed to the 15th century when the first printing press was produced by Johannes Gutenberg. This enabled the typing of books and newspapers which could reach a farther audience. The radio which is an important means of communication was invented early on in the 20th century and the first electronic television was invented in 1927. In recent times, the advent of the internet has made mass communication even much easier.

Prior to the evolution of media, communication to a large group of people was not easy and fast as we have it today. Communities gathered in their numbers to get information from a source. Emissaries were sent to deliver letters across great distances.

Today, a lot of changes have come along with the media which have also affected the values and norms in society. In African society, for example, styles of dressings have changed as trendy styles from the western world that are promoted by the media, have been adopted. Beliefs and ideologies which were mainly superstitious have been enhanced through the media to become more rational. Religion has also been affected as the traditional religions are not widely practiced while Christianity and Islam which find wide coverage in the media have been adopted. All of these give credence to the fact that media has shaped the values and norms in many societies.

4 0
3 years ago
Recall that with the CSMA/CD protocol, the adapter waits K. 512 bit times after a collision, where K is drawn randomly. a. For f
julia-pushkina [17]

Complete Question:

Recall that with the CSMA/CD protocol, the adapter waits K. 512 bit times after a collision, where K is drawn randomly. a. For first collision, if K=100, how long does the adapter wait until sensing the channel again for a 1 Mbps broadcast channel? For a 10 Mbps broadcast channel?

Answer:

a) 51.2 msec.  b) 5.12 msec

Explanation:

If K=100, the time that the adapter must wait until sensing a channel after detecting a first collision, is given by the following expression:

  • Tw = K*512* bit time

The bit time, is just the inverse of the channel bandwidh, expressed in bits per second, so for the two instances posed by the question, we have:

a) BW  = 1 Mbps = 10⁶ bps

⇒ Tw = 100*512*(1/10⁶) bps = 51.2*10⁻³ sec. = 51.2 msec

b) BW = 10 Mbps = 10⁷ bps

⇒ Tw = 100*512*(1/10⁷) bps = 5.12*10⁻³ sec. = 5.12 msec

5 0
3 years ago
Other questions:
  • Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an
    15·1 answer
  • How can i put this sign in my keybord?<br><br> :::::<br> ^<br> Here is the sign
    8·1 answer
  • A car holds 16 gallons of gasoline and can travel 312 miles before refueling. Write aC++ program that calculates the number of m
    9·1 answer
  • Data arranged and stored in a data set
    9·1 answer
  • WILL DO A BRIANLY! Use an algorithm to help the Python Turtle get to the finish line in 10 steps by using only the 3 commands be
    12·1 answer
  • What is the color difference between the iMac and iMac Pro
    14·2 answers
  • A blogger writes that the new "U-Phone" is superior to any other on the market. Before buying the U-Phone based on this review,
    7·2 answers
  • When you check your hard drive to see how much space is available, you are checking your
    15·1 answer
  • Npesta kenos reaction
    13·2 answers
  • Golf scores record the number of strokes used to get the ball in the hole. The expected number of strokes varies from hole to ho
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!