1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
14

A database at a college is required to support the following requirements. Complete the information-level design for this set of

requirements. Use your own experience to determine any constraints you need that are not stated in the problem. Represented the answer in DBDL
a. For a department, store its number and name.
b. For an advisor, store his or her number and name and the number of the department to which he or she is assigned.
c. For a course, store its code and description (for example, MTH110 or Algebra).
d. For a student, store his or her number and name. For each course the student has taken, store the course code, course description, and grade received. In addition, store the number and name of the student's advisor. Assume that an advisor may advise any number of students but that each student has just one advisor.

Computers and Technology
1 answer:
Maslowich3 years ago
6 0

Answer:

Explanation:

check the attached files below for answers to your question, thanks.

You might be interested in
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow the
Anika [276]

Answer:

Possessed objects

Explanation:

Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;

i. smart cards

ii. driver's license

iii. id cards

iv. smart keys

v. smart watches.

Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).

5 0
3 years ago
Haley's employer has asked her to review tens of thousands of social media posts about their company's products and compile this
ArbitrLikvidat [17]

Answer: Variety

Explanation:

According to the given question, Haley is dealing with the variety of the organization products posts on the social media networking as Haley's employer wants to comping all the data or information related to the products into the database system.

  • The database is one of the type of management system that manages all the database that are shared by the customers or users.
  • The main important function of the database is that it organize the data more accurately and properly in the system.
  • The database management system (DBMS) handle all the data in the system more effectively from the variety of the users.

Therefore, Variety is the correct answer.

7 0
3 years ago
Explain why a holiday on a cruise liner will be an ideal holiday​
liubo4ka [24]

Answer:

The great thing about a cruise holiday is that everyone in your party can please themselves yet still have a real holiday together. The kids can make new friends and take part in fun and educational activities during the day, while the adults unwind by the pool, learn a new skill or hit the casino.

3 0
2 years ago
compare a 4 core processor 1.3ghz 8 megabytes 16ram and 2 terabyte hard drive to a 2 core 3.9 ghz 2 megabyte cache 4gb ram and 2
deff fn [24]

Answer:

answer is in the question

Explanation:

4 0
3 years ago
Tablets, smartphones, and video game consoles usually have which of the following types of operating systems? distributed multiu
vovikov84 [41]
Embedded.
<span>
Real-time is for thing like your thermostat (Nest) etc.
Distributed is for huge number crunching supercomputers.
Multi-user would mean more than one person was using the device at the same time with a different device.</span>
6 0
4 years ago
Read 2 more answers
Other questions:
  • Using a second hash function to compute increments for probe increments is called
    15·1 answer
  • What protocol does a web browser normally use? at which osi layer does this protocol work?
    15·1 answer
  • What is looping? the rerecording of sound first recorded on set the recording of sound on set the process of combining different
    11·1 answer
  • DSSS uses a chipping code to encode redundant data into the modulated signal. Which two of the following are examples of chippin
    12·1 answer
  • Which four of the following hardware components are specifically used to enable networking and are not part of a stand-alone com
    13·2 answers
  • Somebody supplied me with a file that was edited on a Windows machine. The file contains carriage returns in addition to the new
    9·1 answer
  • Which one of these lifestyle factors has led to the buildup of litter in our
    13·2 answers
  • ASAP in the middle of this quiz Which of the following arguments might convince a local school board of the need to train upper
    6·1 answer
  • What is resource pooling?
    13·1 answer
  • Which cyber protection condition establishes a protection.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!