1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
7

Discuss why databases are important in accounting information systems. Describe primary and foreign keys, normalization and data

base cardinalities. Why are each important to the database design
Computers and Technology
1 answer:
trapecia [35]3 years ago
7 0

Answer:

ensure integrity. primary key is unique key..foreign key is to connect 2 table.normalization to ensure you keep track on what you should do to create db..

You might be interested in
In object-oriented programming, what is a constructor?
hjlf

A constructor in object-oriented programming is a special method of a class or structure that initializes an object of that type. Basically, it resembles an instance method that usually has the same name as the class. In simple terms, it is a subroutine called to create an object.






3 0
4 years ago
Int x = 25;
Olin [163]

Answer:

printer

Explanation:

4 0
3 years ago
Four examples of computer virus​
Nikitich [7]

Virus that infects files. Macro Virus is a virus that attaches itself to an executable application. This type of virus is commonly found in Microsoft Word or Excel programs.... Browser Hijacker.... Web Scripting Virus.

Good morning, I hope this helps, and if you don't mind, please mark me as brainliest ❤

4 0
3 years ago
_______ is the lightest chemical element <br> A.oxygen<br> B.hydrogen<br> C.helium
Oksanka [162]
B. Hydrogen because it has an atomic number of 1 and molar mass of 1
6 0
3 years ago
Read 2 more answers
When a computer is infected by a virus, _______.
ira [324]

Answer:

Explanation:

A virus can damage programs, delete files and reformat or erase your hard drive, which results in reduced performance or even crashing your system entirely. Hackers can also use viruses to access your personal information to steal or destroy your data.

8 0
3 years ago
Other questions:
  • What are the 3 parts of a browser window? What componets are in each?
    5·1 answer
  • Which of the following is a good technique to use when driving in an urban environment
    6·2 answers
  • The keyboard and the mouse are types of BLANK devices
    15·2 answers
  • If the derived class does not override a public member function of the base class, you may specify a call to that public member
    7·1 answer
  • Which piston stroke of the four-stroke cycle prepares the fuel mixture for combustion??
    8·1 answer
  • Ram is also called __________________________________________________
    11·1 answer
  • If the old and new systems are operated side by side until the new system has proven itself, this type of system conversion plan
    11·1 answer
  • __________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.)
    10·2 answers
  • The pH scale is_____ ?
    5·1 answer
  • If the bookstore sold 8 books for $66 at that rate how much was one book
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!