1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet-ann [11.9K]
3 years ago
13

Describing the One-to-Many Relationship

Computers and Technology
2 answers:
hoa [83]3 years ago
8 0

Answer:

What is another name for the one-to-many relationship?

child-to-parent

Correct Answer: parent-to-child( B)

student-to-teacher

teacher-to-student

Explanation:

Alecsey [184]3 years ago
6 0

Answer: B) Parent-to-child

You might be interested in
Factors to consider while selecting a software to use​
luda_lava [24]
You need to consider what exactly you will be using the software for, there are many different softwares and they all have different purposes.
6 0
3 years ago
Which types of attacks are thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and spe
lesantik [10]

The types of attacks that are known to be thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and special characters are said to be Brute Force Attacks.

What is Brute Force Attacks?

This is known to be an attack that is said to be a very  crude type of attack and it is often seen as a brute-force attack.

Note that is one that does not depend on lists of passwords, but it is one that often tries all the  very possible combinations of permitted character types.

Hence, this type of attack was known to be historically seen as ineffective, and it is said to be The types of attacks that are known to be thwarted by complex passwords that are combinations of upper and lower case letters, numbers, and special characters are said to be Brute Force Attacks.

Learn more about Brute Force Attacks from

brainly.com/question/17277433

#SPJ1

3 0
2 years ago
Do you think Apple will eventually meet their goal of becoming a replacement for a physical wallet
Dmitry_Shevchenko [17]
Yes they are the leading tech innovators of the 21st century and have already made massive strides in this direction
8 0
3 years ago
To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.
grandymaker [24]
That should be the replace function which performs word replacements in documents.
6 0
3 years ago
Which of the following sentences is written in the active voice
STALIN [3.7K]
D. The chocolate cake will be served to the queen. This is the only one not in past tense. Active means present or near present, hence the word "will." 
3 0
4 years ago
Read 2 more answers
Other questions:
  • What could prevent earmuffs from providing your ears good protection from noise?
    10·1 answer
  • Find a, b, and c<br> A a=4 square root of 6 b= 8 square root of 2 ; c= 4 square root of 2
    12·1 answer
  • Which aspects of a project do project makers oversee?
    12·2 answers
  • A(n) _____ can be used to convert digitized documents into ascii (american standard code for information interchange) text that
    6·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • Why should you not perform any personal grooming task while driving?
    5·2 answers
  • Jack is an accountant. He can't access the spreadsheet software, which is installed on the server. What should Jack do?
    5·2 answers
  • In Vista and Windows 7, the Appearance and Personalization option allows you to change the
    14·1 answer
  • Which of the following is a common financial aid scam that students sometimes find on the Internet? Grant and scholarship databa
    8·2 answers
  • Location of a video or photoshoot is not important when it comes to preplanning the shoot.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!