1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
15

When converting the relationships to the relational model and the database schema, it is possible that some of the relationships

become discrete tables but some do not. Explain why that occurs. (
Computers and Technology
1 answer:
klemol [59]3 years ago
8 0

Answer:

b mwcvhgdvgcvyjac hgscvghsdv

Explanation:

You might be interested in
The mutt software is an example of what type of mail service software on Linux? a. Mail Delivery Agent b. Mail Transport Agent c
Anna11 [10]

Answer:

Option D i.e., Mail User Agent is the correct option.

Explanation:

The Mutt software is software that works as the mail client on Linux or Unix Operating Systems and MUA(Mail User Agent) is also the mail client that provides its users the facility of sending and receiving emails through the internet and it does not provide the offline access. So the Mutt software is the type of Mail User Agent which is based on the mail client.

8 0
3 years ago
To do a good job of searching periodicals at your library, you should use A) the Library of Congress Authorities webpage. B) web
jonny [76]

Answer:

C) the online catalog.

Explanation:

An online library catalog describes the periodicals, videotapes, and books as it is the electronic bibliographic database. This evolved from the printed source, the library card catalog. Hence, this clarifies that its C. the correct option.

However, LexisNexis is the unit that gives computer-assisted research CALR and business research as well as risk management services. So through this, you can get the legal and journalistic documents.

And the stack or the book stack which is referred to as the library building block is for book storage. And the library of Congress Subject Headings is active since 1898 and holds the catalog materials which are being collected by the Library of Congress, and they do not keep track of periodicals. And the BizMiner is for financial reports.

Hence, the correct answer is the C) the online catalog.

5 0
3 years ago
Write only in C, not C++.
yawa3891 [41]

Answer:

#include <iostream>

using namespace std;

int main() {

  int k;

double d;

string s;

cin >> k >> d >> s;

cout << s << " " << d << " " << k << "\n" << k << " " << d << " " << s; }

                                                                   

Explanation:

k is int type variable that stores integer values.

d is double type variable that stores real number.

s is string type variable that stores word.

cin statement is used to take input from user. cin takes an integer, a real number and a word from user. The user first enters an integer value, then a real number and then a small word as input.

cout statement is used to display the output on the screen. cout displays the value of k, d and s which entered by user.

First the values of k, d and s are displayed in reverse order. This means the word is displayed first, then the real number and then the integer separated again by EXACTLY one space from each other. " " used to represent a single space.

Then next line \n is used to produce a new line.

So in the next line values of k, d and s are displayed in original order (the integer , the real, and the word), separated again by EXACTLY one space from each other.

The program along with the output is attached.

7 0
4 years ago
How many passes will it take to find the five in this list?
elena-14-01-66 [18.8K]

Answer:

7 or six mabye

Explanation:

6 0
3 years ago
Read 2 more answers
You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
docker41 [41]
A for loop would be the most convenient.
7 0
3 years ago
Other questions:
  • While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel
    13·1 answer
  • Which command is used to add conditions to the basic query?
    15·1 answer
  • Is printer an input device​
    5·1 answer
  • Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
    7·1 answer
  • In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
    6·1 answer
  • Keyword stuffing is considered to be a black hat technique for SEO and is highly suggested today by Google.
    6·1 answer
  • Analyze the following recursive method and indicate which of the following will be true.
    7·1 answer
  • do you think that some people have difficulty talking to others face to face because of how prevalent texting is today
    15·2 answers
  • If you insert a single row by using the Insert command on the shortcut menu, you can continue inserting rows by repeatedly press
    7·2 answers
  • LAB: Parsing dates in M/D/Y format
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!