1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
7

United Broke Artists (UBA) is a broker for not-so-famous artists. UBA maintains a small database to track painters, paintings, a

nd galleries. A painting is created by a particular artist and then exhibited in a particular gallery. A gallery can exhibit many paintings, but each painting can be exhibited in only one gallery. Similarly, a painting is created by a single painter, but each painter can create many paintings. Using PAINTER, PAINTING, and GALLERY, in terms of a relational database:
a. What tables would you create, and what would the table components be?
b. How might the (independent) tables be related to one another?

Computers and Technology
2 answers:
lions [1.4K]3 years ago
7 0

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the relation and the table names.

zaharov [31]3 years ago
5 0

Answer:

See explaination

Explanation:

a. The table to be created is the ERD table.

b. See attached file for the diagram

You might be interested in
Evaluating how current, credible, and unbiased a source is ensures:
Tanya [424]

The answer is

A. your information is more accurate and useful

I hope it helps you. Please mark me brainliest answer.

6 0
3 years ago
BOTH QUESTIONS ONLY FILL IN C++ CODEWrite a copy constructor for CarCounter that assigns origCarCounter.carCount to the construc
Alborosie

Answer:

im lost tell me a question then ill answer

Explanation:

4 0
3 years ago
. Consider the problem of finding the largest element in a list of n elements. What will be the basic operation of an algorithm
natali 33 [55]

Answer:

Comparison.

Explanation:

When we have to find a largest in a list of n elements.First we have to iterate over the list so we can access all the elements of the list in one go.Then to find the largest element in the list we have to initialize a variable outside the loop with the minimum value possible and in the loop compare each element with this value,if the element is greater than the variable assign the element to the variable.Then the loop will find the largest element and it will be the variable.

4 0
3 years ago
One of the most<br> common uses of spreadsheet programs are
Bas_tet [7]
Common uses for spreadsheet documents be
-Organizing bills and money
-Groups of people and events
-Family plannings for weeks
-Grocery Lists.

I hope this helps!
8 0
3 years ago
Read 2 more answers
Select the correct answer.
True [87]

Answer:

office access cars

Explanation:

<em><u>HOPE</u></em><em><u> </u></em><em><u>THIS</u></em><em><u> </u></em><em><u>WILL</u></em><em><u> </u></em><em><u>HELP</u></em><em><u> </u></em><em><u>U</u></em><em><u>,</u></em><em><u> </u></em><em><u>MARK</u></em><em><u> </u></em><em><u>ME</u></em><em><u> </u></em><em><u>AS</u></em><em><u> </u></em><em><u>A</u></em><em><u> </u></em><em><u>BRAINLIST</u></em>

3 0
3 years ago
Other questions:
  • According to the Big Five Factors model, all but _____ are categories.
    11·1 answer
  • Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name in
    5·1 answer
  • How do optical discs store data? select one:
    15·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • Searching for a particular record in a database is called “querying the data.”<br> True<br> False
    9·2 answers
  • Use the drop-down tool to select the word or phrase that completes each sentence.
    7·1 answer
  • Help brainleist giving exam
    15·1 answer
  • What is Japanese tradition?
    8·2 answers
  • A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called
    8·1 answer
  • The three main objectives of information security are
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!