1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
3 years ago
14

The relation LIBRARY records books currently on loan to students. Each book has one ISBN_NO The library has several copies of ea

ch book. A student may borrow more than one book but may not borrow a book they have already checked out. Assume also that no two library members have the same name.
ISBN_NO STUDENT_NAME STUDENT_ADDRESS
01 Liu Phelps
02 Liu Phelps
02 Holmes Phelps
03 Lopez Hollister
LIBRARY
a) Is LIBRARY in 1NF?
b) Identify candidate key(s)
c) Identify functional dependencies
d) Explain why is LIBRARY not in 2NF?
e) Decompose LIBRARY to comply with 2NF rules.
Computers and Technology
1 answer:
Nataly [62]3 years ago
3 0
I think the answer is E
You might be interested in
In a newspaper advertisement for a hybrid car, which of these presentation methods would be most effective
faltersainse [42]
Your answer is a....
6 0
3 years ago
Read 2 more answers
John just bought a used iPad from a friend who had lost the charging cable. John notices that the cable is like the charging cab
7nadin3 [17]

Answer:

an iphone charger

Explanation:

5 0
4 years ago
I NEED HELP ASAP IM BAD AT THIS
ra1l [238]

A float is a floating point number. This means that's the number has a decimal place. Numbers with or without decimal places can be stored in a float variable but more commonly numbers with decimal points.

The correct choices are 1 and 3.4

4 0
3 years ago
Which of the following are features of the HTTPS protocol?
gavmur [86]

Answer:

All traffic is encrypted. No one on your network can see what is going on (except for knowing where those packets are going to).

The identity of the remote server can be verified using certificates. So you also know that it really is your bank that you are talking to.

Optionally (and not in wide-spread use), the identity of the client can also be verified using certificates. This would allow for secure login to a site using chip cards instead of (or in addition to) password

8 0
3 years ago
I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
Ilia_Sergeevich [38]
Your answer is D.

Hope this helps and if you could answer the question I just uploaded titled giving brainliest that would be great. Basically, what you have to do is research why the book titled the list of things that will not change and explain why it’s your favorite book based on the message it tells you! Go to my profile and go to questions.
7 0
3 years ago
Other questions:
  • • Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?
    5·1 answer
  • As a digital forensics examiner, it’s a good idea to build a list of references for information on privacy laws in other countri
    13·1 answer
  • Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
    8·1 answer
  • Computer trespass can be harmless.<br> a. True<br> b. False
    15·2 answers
  • Using the spreadsheet below, which formula can be used to determine Albert's hourly wage?
    6·2 answers
  • Sensitive data is always classified true or false
    14·1 answer
  • You need to secure your wireless network. which security protocol would be the best choice
    10·1 answer
  • WILL MARK BRAINILY!!
    9·2 answers
  • 1. Define the term Intranet.
    10·1 answer
  • What are two advantages of edge computing over cloud computing?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!