1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
6

Question 2 (2 points)

Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
3 0

Answer: i don't know someone do it

Explanation:

You might be interested in
Which is the most popular language used in game programming?
ANEK [815]

Answer:

B C++

Explanation:

The two most common languages for game designers to learn are C++ and Java, although other languages are popular (such as C# for Unity). Another type of programming you may hear referred to is scripting, but that essentially comes down to a type of systems programming.

4 0
3 years ago
Read 2 more answers
In a proper webpage, which tag holds all of a webpages visible HTML?
Evgen [1.6K]

Body.


head contains all of the data that we generally don't see.


Link is used to link to external stylesheets.


script is where you would type scrips.


doctype is used to tell the browser the document type.

6 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
In preparing categorical variables for analysis, it is usually best to​ Select one:
Allushta [10]

Answer:

a. convert the categories to numeric representations

Explanation:

6 0
3 years ago
Consider the following relation: CAR_SALE (Car#, Date_sold, Salesman#, Commision%, Discount_amt Assume that a car may be sold by
Nady [450]

Answer:

See explaination

Explanation:

The given relation is:

CAR_SALE(Car#, Date_sold, Salesperson#, Commission%, Discount_amt)

Primary key: {Car#,Salesperson#}

We will first check whether the relation is in 1NF.

A relation is said to be in the 1st Normal form(1NF) if all the columns in the relation have atomic values. In this case, the relation is in 1NF.

A relation is said to be in the second normal form(2NF) if it satisfies the condition that all non keys are completely dependent on the primary key and just a part of the primary key.

In the case of the CAR_SALE relation, the Commission% depends only on the Salesperson# and not on the combination of Car# and Salesperson#. This means that the given relation is not in 2NF. To satisfy 2NF, we make two relationships as given below:

SALE_DETAIL(Salesperson#, Commission%)

and CAR_SALE(Car#, Date_sold, Salesperson#, Discount_amt)

Now both the relations are in 2NF.

For a relation to be in 3NF, no non-key should be functionally dependent on another non key.

In the case of the CAR_SALE relation, it is specified that the Date_sold field determines the Discount_amt. Therefore the modified CAR_SALE is not in 3NF.

To satisfy 3NF, we seperate the non key and the dependent non key and create a different table.

Final Relations:

SALE_DETAIL(Salesperson#, Commission%)

Discount_Detail(Date_Sold, Discount_Amt)

CAR_SALE(Car#, Date_sold, Salesperson#)

7 0
3 years ago
Other questions:
  • Input _____ is a template or pattern that restricts data entry and prevents errors.
    7·1 answer
  • Which of the following courses would an aspiring film composer most likely take?
    12·2 answers
  • To activate a wizard to help in creating combo boxes and command buttons, make sure the ____ button is selected
    6·1 answer
  • A page can have High needs met rating even if it is not related To the topic of the query​
    9·1 answer
  • The material placed around the ignition device to feed the flame in arson is referred to as
    8·1 answer
  • For most applications, saving sound files at the _____ bit resolution provides a good balance of sound quality and file size.
    15·2 answers
  • Describe a hybird electrical vehical
    12·1 answer
  • What is a header row?
    8·1 answer
  • computer is an electronic machine that is used for data processing to produce meaningful information explain in statement​
    5·1 answer
  • ________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Hum
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!