1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
2 years ago
11

Write two example use of relationships ICT

Computers and Technology
1 answer:
Yakvenalex [24]2 years ago
3 0

Answer:

Read it all before you write if this isn't what you searching for I'm sorry...:(

A relationship, in the context of databases, is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationships allow relational databases to split and store data in different tables, while linking disparate data items.

For example, in a bank database a CUSTOMER_MASTER table stores customer data with a primary key column named CUSTOMER_ID; it also stores customer data in an ACCOUNTS_MASTER table, which holds information about various bank accounts and associated customers. To link these two tables and determine customer and bank account information, a corresponding CUSTOMER_ID column must be inserted in the ACCOUNTS_MASTER table, referencing existing customer IDs from the CUSTOMER_MASTER table. In this case, the ACCOUNTS_MASTER table’s CUSTOMER_ID column is a foreign key that references a column with the same name in the CUSTOMER_MASTER table. This is an example of a relationship between the two tables.

You might be interested in
1. Our Systems are Microsoft Dynamics OLTP, we move data from the Source Systems through Staging to a Data Warehouse. Our report
zmey [24]

Answer:

1. More access to data

2.convenience

3. Easy creation of BI solutions

4. Report creation

5. Saves time

Explanation:

A data warehouse can be described to be an electronic storage system that contains large amount of facts and information which sources for and also maintains data from different sources; either external or internal.

The most important reason for a data warehouse is for it to store great amounts of data to be used for query and also to be used for analysis.

Why do we use a data warehouse?

1. Users have more access to data due to the integration of various sources of data. It makes use of real time data facts

2. You can conveniently store and also create metadata

3. Business intelligence solutions can easily be created using data warehouses.

4. Users can easily create their own reports

5. Data warehouses makes accessing different data sets faster. It is a time saver as business users are not going to spend time trying to retrieve data from various sources.

4 0
2 years ago
Which of the following is a variable expense for many adults?
IRINA_888 [86]
<span>C. Their monthly rent payment.</span>
7 0
3 years ago
Read 2 more answers
Select the correct text in the passage.
grin007 [14]

Answer: Because it is known for that

Explanation:

I think it would be The Hawaiian islands are known for their volcanic activities

8 0
3 years ago
Which of the following is true of how packets are sent through the Internet?
klemol [59]

Packet metadata is used to route and reassemble information travelling through the Internet

-scav

5 0
2 years ago
When you right click the taskbar icon a ___ pops up showing the most recently visited tasks or sites
Vinil7 [7]

Answer:

when you right click the task bar icon a <u>recently closed</u> popup showing the most recently visited tasks or sites

Explanation:

There are different icons shown in task bar for different programs to open them on a single click. These programs are Google Chrome, Mozilla Firefox, and some other browsers.

Whenever we want to see the recently closed programs, tasks or websites that we recently visited, we just right click on that browser icon in task bar. There is a popup shown that contain the information of the recently visited websites or tasks with the name of recently closed or recent item.

4 0
2 years ago
Other questions:
  • Which of the following is a sigh that your computer may have been infected with malicious code
    12·1 answer
  • How are network computers different from traditional personal computers? describe some usage scenarios in which it is advantageo
    12·1 answer
  • Write a program "addnumbers.c" where it takes as many arguments as the user includes as command line arguments and calculates th
    11·1 answer
  • How many megapixels is in a macbook air 2017 camera
    10·1 answer
  • Write an application that displays the strings in the provided array alphabetically in ascending order.
    9·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • "if" statements are part of creating computer programs, what are these instructions called and how would you use them?
    11·2 answers
  • 1.erros can easily be ____ 2.work is done in an ____ no mess environment 3.colors do not _____ and brushes are never ______ 4.st
    14·1 answer
  • 8.1.4: Ghost Invasion!
    10·1 answer
  • When companies charge different prices for the same product, they're using
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!