1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zheka24 [161]
3 years ago
6

A manufacturing company produces products. The following product information is stored: product name, product ID and quantity on

hand. These products are made up of many components. Each component can be supplied by one or more suppliers. The following component information is kept: component ID, name, description, suppliers who supply them, and products in which they are used.
Create an Relational Data Model to show how you would track this information.
Show entity names, primary keys, attributes for each entity, relationships between the entities and cardinality.
ASSUMPTIONS
· A supplier can exist without providing components.
· A component does not have to be associated with a supplier.
· A component does not have to be associated with a product. Not all components are used in products.
· A product cannot exist without components.
Computers and Technology
1 answer:
denis23 [38]3 years ago
8 0

Answer:

b

Explanation:

took the test a while back

You might be interested in
You can tell when an image is selected, because its sizing handles will be visible. True or False
Ivenika [448]

This is true because you can go and check yourself in Word and you can click on an image and the sizing handles will appear.

hope that helps :)

8 0
3 years ago
Read 2 more answers
What type of protocol provides a way to transfer files from one computer to another over tcp/ip such as lan?
leva [86]
FTP provides this functionality.
5 0
3 years ago
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also
bekas [8.4K]

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

7 0
3 years ago
A merge operation in Word generally requires _____ files(s).
Zolol [24]
Two files because three
3 0
3 years ago
If you entered data into row 4 and it should be in row 3, you should
jeka94
 the answer in my opinion would have to be B.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What can be entered in a search box to find data? data size a name relevance purpose
    5·2 answers
  • High Frequency Traders are
    5·1 answer
  • Please explain why an operating system makes a great attack target.​
    9·1 answer
  • EX 3.8 Write code to declare and instantiate an object of the Random class (call the object reference variable rand). Then write
    6·1 answer
  • Write an if statement that prints the message ""The number is not valid"" if the variable distance is outside the range 100 thr
    8·1 answer
  • $8.25/hour; _____$/year, when working 40 hours a week.
    6·1 answer
  • Tara and Zach are leading a systems development project and they want the investigation phase to go smoothly and quickly. They d
    10·1 answer
  • A central issue of public sharing is:
    13·2 answers
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
  • Write code to define a function named mymath. The function has three arguments in the following order: Boolean, Integer, and Int
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!