1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Akimi4 [234]
3 years ago
7

Consider an entity set Person, with attributes social security number (ssn), name, nickname, address, and date of birth(dob). As

sume that the following business rules hold: (1) no two persons have the same ssn; (2) no two persons have he same combination of name, address and dob. Further, assume that all persons have an ssn, a name and a dob, but that some persons might not have a nickname nor an address.
A) List all candidate keys and all their corresponding superkeys for this relation.
B) Write an appropriate create table statement that defines this entity set.
Computers and Technology
1 answer:
lisov135 [29]3 years ago
4 0

Answer:

\pi

Explanation:

You might be interested in
Manny has created more than one hundred bookmarks. When he looks at the menu, he has to scroll through a very long list of bookm
timurjin [86]
1) create shortcuts for the bookmarks you use the most.
8 0
3 years ago
2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F
nekit [7.7K]

Answer:

See attached image

Explanation:

7 0
3 years ago
Note oj cyber security​
dybincka [34]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

7 0
3 years ago
What will be the value of “sumtotal” when this code is executed?
Lelu [443]

Answer:

2

Explanation:

if-else is the statement that is used for checking the condition and if the condition is True, then execute the statement otherwise not executed.

initially, the value of n1 = 3, n2 = 6, n3 = 2, sumtotal = 4.

after that, if statement checks for the condition.

3 != 4

condition is TRUE, then the statement sumtotal -= n3; will be executed.

write the statement in simple form:

sumtotal = sumtotal - n3;

so, sumtotal = 4-2 = 2.

after that, the program does not check the further and exit the if-else statement.

Therefore, the answer is 2.

4 0
3 years ago
javascript Write a program to calculate the credit card balance after one year if a person only pays the minimum monthly payment
Luda [366]

Answer:

Explanation:

The following code is written in Javascript as requested and creates a function that takes in the total credit card debt amount and the minimum monthly payment. Then it calculates the new balance at the end of the year after paying 12 monthly minimum payments. Finally, printing out the new balance to the console which can be seen in the attached picture below.

let brainly = (debt, minimum) => {

   debt = debt - (minimum * 12);

   console.log("Credit Card Balance after one year: $" + debt);

}

brainly(50000, 3400);

7 0
3 years ago
Other questions:
  • Quien quiera jugar fortnote en una hora y media o antes pase id
    12·1 answer
  • Which of the following is not a major reason for an email bounce?
    8·1 answer
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • A _____ attack is designed to generate a lot of activity on a network by flooding it with useless trafficenough traffic to overw
    14·2 answers
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • Where can you access email accounts on your Windows 7 computer in order to modify current account or create new ones
    15·1 answer
  • Que quiere decir analogico
    6·1 answer
  • You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Altho
    10·1 answer
  • 15. It is the process of capturing data or translating information to recording format
    12·1 answer
  • Which security protocol for wireless networks attempts to establish the same security for them as would be present in a wired ne
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!