1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
11

For each of the descriptions below, perform the following tasks:

Computers and Technology
1 answer:
Zigmanuir [339]3 years ago
8 0

Answer:

attached below in the explanation and the diagrams attached

Explanation:

<em>question</em>

<em>i) identify the degree and cardinality of the relationship</em>

<em>ii) Express the entities and the relationships with attributes in each description graphically with an E-R diagram </em>

<u>A)</u>

i) The degree and cardinality of the relationship

  • The entities PIANO, MODEL and DESIGNER have a degree of two i.e. Binary relationship
  • The cardinality of the entities PIANO, MODEL and DESIGNER have a relationship of ONE-to-many

ii) description graphically with an E-R diagram

The E-R diagrams show that  The degree of the relationship for the entities PIANO, MODEL, and DESIGNER is two(2).  and also shows that there is a One-to-Many cardinality available in the entities PIANO, MODEL, and DESIGNER

E-R diagram Attached below

<u>B) </u> 

i) The degree and cardinality of the relationship

  • entities PIANO and Technician have a degree of two ( 2 ) ; i.e. a Binary relationship
  •  The cardinality of the entities PIANO, and TECHNICIAN have  a relationship of Many-to-Many.

ii) Graphical description with an E-R diagram

The diagram describes/ shows that, entities PIANO and Technician have a degree of two ( 2 ) ; i.e. a Binary relationship and also The cardinality of the entities PIANO, and TECHNICIAN have  a relationship of Many-to-Many.

E-R diagram attached below

<u>C) </u>

i) Degree and cardinality of the entity Technician

  •  The entity TECHNICIAN has a degree one, i.e.  a unary relationship.
  • The cardinality of the entity TECHNICIAN have the relationship of  One-to-Many.

ii) E-R diagram attached below

<u>D) </u>

i) Degree and cardinality of the relationship

  • The entities TABLET TYPE and PROCESSOR TYPE have a degree of two(2) , i.e. a binary relationship
  • The cardinality these entities TABLET TYPE, and PROCESSOR TYPE have is a Many-to-Many relationship

ii) E-R diagram attached for TABLET TYPE, PROCESSOR TYPE is attached below

<u>E) </u>

i) Degree and cardinality of the relationship

  • The entities TABLET TYPE, TABLET COMPUTER, and CUSTOMER have a degree of two(2) ; i.e. a binary relationship.
  • The cardinality these entities TABLET TYPE, TABLET COMPUTER, and CUSTOMER have is a   One-to-Many relationship

also  the shipment to the customer is multiple hence the relationship can be said to be  Many-to-Many relationship

also The attribute Shipping Date will become an attribute of that M: M relationship.

ii) The E-R diagram for TABLET TYPE, TABLET COMPUTER, CUSTOMER  is attached below

<u>F)</u>

i) Degree and cardinality of the relationship  between TABLET TYPE, TECHNICIAN

  • The entities TABLET TYPE, and TECHNICIAN have a degree of two(2); i.e.  a binary relationship.
  •  The cardinality these entities TABLET TYPE, and TECHNICIAN have is a Many-to-Many relationship

ii) E-R diagram attached below

You might be interested in
Concept of CPU scheduler?​
vekshin1

Answer:

CPU scheduling is a process which allows one process to use the CPU while the execution of another process is on hold(in waiting state) due to unavailability of any resource like I/O etc, thereby making full use of CPU. ... The selection process is carried out by the short-term scheduler (or CPU scheduler).

6 0
3 years ago
What's the biggest security issue with using social networking sites to market your listings?
Savatey [412]

The biggest security issue with using social networking sites to market your listings is Criminals may use social networking sites to identify your personal data.

<h3>What is a social marketing site?</h3>

A social marketing site is a site where people from around the world are connected in one place and share their thoughts and photos and other data.

The social sites are on the internet and there is a chance of stealing data and it identity theft, phishing, online predators, internet fraud, and other cybercriminal attacks are also some risks.

Thus, the largest security concern with using social networking sites to sell your listings is that thieves could use these sites to find personal information about you.

To learn more about social marketing sites, refer to the link:

brainly.com/question/15051868

#SPJ4

6 0
1 year ago
What is the difference between (IF instructions &amp; WHILE instructions )<br> 0<br> 를 들<br> T<br> !
lara31 [8.8K]

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

7 0
3 years ago
Your customer asks you if it would be worth the investment for him to have Ethernet cabling installed to reach each of his works
Helen [10]

Answer:

Yes

Explanation:

Depending on the ethernet standard used, the IEEE 802.3 is faster than the WIFI (IEEE 802.11ac).

The ethernet protocol on cabled networks are of different speed based on ethernet standard which ranges from 10 Mega-bits to 100 Giga-bits per second. This protocol is found in the physical layer of the OSI model.

The wifi 802.11ac also known as wifi 5 is a wireless connection medium in the physical layer of the OSI model. It has a range of aggregate speed capacity of  433 mega-bits per second to 6.77 giga-bits per second.

5 0
3 years ago
Adam, a flower shop owner, wants to drive phone calls to his store. Which Adwords tool should he use to track how many calls res
Kipish [7]

Answer:D)Conversion tracking

Explanation:Conversion tracking is the tool that helps the user to know about the interaction of the ad given by him with customer. It helps in the tracking in the ways like calls from ads, call conversion importing,mobile website gaining the number of clicks etc.

Thus,  Adam needs to use the conversion tracking tool which for driving the calls towards his store.He can track the effectiveness of the ad which drives the calls.

Other options given are incorrect because they cannot keep the record of the  ads seen by the customer with the help of tracking. Thus the correct option is option(D).

8 0
3 years ago
Other questions:
  • 1. It defines the amount of white space that appears at the top, bottom, left, and right edge of
    15·1 answer
  • Why is it difficult to enforce laws against intellectual theft?
    10·1 answer
  • Why does people that gets abused not report?
    5·1 answer
  • Client computers cannot function unless they are connected to the network because they cannot access an operating system.
    7·1 answer
  • All users on the network have antivirus software; however, several users report that they have what an administrator described a
    10·1 answer
  • What do you believe are the motives of a cyber criminal? Why?
    15·1 answer
  • Assume the following instruction mix for some program:______.
    8·1 answer
  • 1. A tachometer measures:
    8·1 answer
  • What is a special type of variable used in subroutines that refers to a piece of data?
    15·1 answer
  • Which is an example of a demand account
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!