1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
12

Fire Tint, Inc., (FTI), applies tint to airplane canopies (front windows) manufactured by other companies. When the canopy manuf

acturer asks FTI to tint a canopy, FTI tracks the manufacturer, model number, and the CIN, a unique serial number assigned to each individual canopy by the manufacturer. FTI has a finite set of standard treatments it applies to canopies. Each treatment applied by FTI has a treatment number, treatment description, and a published price for each treatment. Although there is a published price for each treatment type, FTI often negotiates the actual price for each treatment when a manufacturer places an order.Sometimes more than one different treatment is applied to the same canopy. When a treatment is applied to a canopy, FTI keeps track of the treatment applied, the date it was applied, and the start and end time of when the treatment was applied, and the negotiated actual price.
Please choose the ERD that most appropriately represents the scenario above.
(A) because it is serializable
(B) because it is serializable
(C) because it is virtual (non-seralized)
(D) because it is virtual (non-serialized)
Computers and Technology
1 answer:
Andreyy893 years ago
5 0

Answer:

(A) because it is serializable

Explanation:

The full form of ERD is the Entity Relationship Diagram. It is commonly known as the ER Model or the ER diagram. It is a kind of structural diagram which is used in the database design.

In the context, the most appropriately representing the scenario is option (A).

The serializable schedule always results in the consistent database. It is allowed to the transactions that are to be executed simultaneously. Therefore, all the transaction gets well executed concurrently. The serializable schedules are always recoverable.

You might be interested in
Name two different ways you can bring up the my computer folder
sweet [91]

The My Computer folder is a multipurpose tool and is a gateway to all the data stored in the computer. This folder sits at the top of your laptop or PC. It can be found on your computer’s desktop, on the start menu and within the windows explorer. <u>Clicking or double clicking on these options will bring up the My Computer folder. </u>

<u>Another easier way of doing this is to hold down the windows + E combination keyboard keys.</u>

7 0
3 years ago
Read 2 more answers
List the difference between sdram and dram​
IRISSAK [1]

Answer:

i need this for a challenge

Explanation:

4 0
3 years ago
What is the trade-offs in time complexity between an ArrayList and a LinkedList?
AURORKA [14]

Answer:

  In the time complexity, the array-list can easily be accessible any type of element in the the given list in the fixed amount of time.

On the other hand, the linked list basically require that the list must be traversed from one position to another end position.

The Array-List can get to any component of the rundown in a similar measure of time if the file value is know, while the Linked-List requires the rundown to be crossed from one end or the other to arrive at a position.

4 0
3 years ago
What kind of information can be found in a ROM:
tester [92]
The answer is C, ROM often stores the basic instructions a computer needs when powering on, part if the BIOS.
3 0
3 years ago
Multiple Choice
zalisa [80]
Zeros and ones
Hope the helps
Godspeed
7 0
3 years ago
Other questions:
  • 2a
    8·1 answer
  • Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
    8·1 answer
  • What organization is responsible for the registration of Internet domain names?
    14·1 answer
  • Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
    9·1 answer
  • According to which virtue do you need to secure information by limiting computer access to authorized personnel only?
    6·1 answer
  • Write an if-else statement for the following: If user_tickets is less than 5, assign 1 to num_tickets. Else, assign user_tickets
    6·1 answer
  • The transmission control protocol (TCP) layer helps computers to communicate in which of the following ways?
    10·1 answer
  • Describe how you will lunch a web browser using the start menu​
    6·2 answers
  • The name for the instructions you write to a computer in a program
    7·2 answers
  • What is the optimal number of members for an Agile team?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!