1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
12

Fire Tint, Inc., (FTI), applies tint to airplane canopies (front windows) manufactured by other companies. When the canopy manuf

acturer asks FTI to tint a canopy, FTI tracks the manufacturer, model number, and the CIN, a unique serial number assigned to each individual canopy by the manufacturer. FTI has a finite set of standard treatments it applies to canopies. Each treatment applied by FTI has a treatment number, treatment description, and a published price for each treatment. Although there is a published price for each treatment type, FTI often negotiates the actual price for each treatment when a manufacturer places an order.Sometimes more than one different treatment is applied to the same canopy. When a treatment is applied to a canopy, FTI keeps track of the treatment applied, the date it was applied, and the start and end time of when the treatment was applied, and the negotiated actual price.
Please choose the ERD that most appropriately represents the scenario above.
(A) because it is serializable
(B) because it is serializable
(C) because it is virtual (non-seralized)
(D) because it is virtual (non-serialized)
Computers and Technology
1 answer:
Andreyy893 years ago
5 0

Answer:

(A) because it is serializable

Explanation:

The full form of ERD is the Entity Relationship Diagram. It is commonly known as the ER Model or the ER diagram. It is a kind of structural diagram which is used in the database design.

In the context, the most appropriately representing the scenario is option (A).

The serializable schedule always results in the consistent database. It is allowed to the transactions that are to be executed simultaneously. Therefore, all the transaction gets well executed concurrently. The serializable schedules are always recoverable.

You might be interested in
Test unit 8 edhesive answers ​
True [87]
What are the questions
7 0
3 years ago
Your friend sends you a computer game. after installing the game on your computer, you realize that it plays very slowly. you kn
dsp73
Memory possibly. Or another pricessor.
8 0
3 years ago
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
4 years ago
Please select the word from the list that best fits the definition
Troyanec [42]

Answer

Linguistics

Explanation:

linguistics can be defined as scientific study of language and its structure, including the study of grammar, syntax, and phonetics.

there are some  Specific branches of linguistics  and that include computational linguistics, comparative linguistics, and structural linguistics.

study material into songs can also be defined as a linguistic hence linguistic is the correct option for you question

6 0
3 years ago
Read 2 more answers
What are five don’ts of using a computer
Sonja [21]

Answer:

well, as long as there are no right or wrong answers, don't:

look to closely at the screen, as it may mess up your eyes

hold a drink above the computer, as it may spill and cause "sticky keys"

go to sites that you know will give your a computer a virus, cause they cost hundreds of dollars to repair, and some aren't able to come out

go on illegal sites/do illegal operations to the computer itself, because then you won't have a computer

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which does an icon on the desktop signify?
    12·1 answer
  • Assuming you have a TCF free student checking account, how many maximum overdraft fees can you incur in one day?
    12·1 answer
  • Where could an identity theft access your personal information?
    9·2 answers
  • Why computer is known as data processing system?
    14·1 answer
  • Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
    9·1 answer
  • BEING TIMED HELP ASAP
    12·2 answers
  • True or False The two types of general construction projects are residential for homes or dwellings and commercial for a commerc
    7·1 answer
  • Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two
    10·1 answer
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
  • The new software analyzes sales conversion per sales in a way intended to increase sales success. what is the first thing you mu
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!