1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatiyna
3 years ago
11

1. In the Entity-Relationship Model, relationships can have attributes.

Computers and Technology
1 answer:
Vladimir [108]3 years ago
5 0

Answer:

1. A. True

2. A. True

3. B. Conceptual.

4. Three (3).

Explanation:

An Entity-Relationship Model is used in databases to describe the structure and relationship between data elements known as entities.

1. True: In the Entity-Relationship Model, relationships can have attributes.

2. True: Attributes are the smallest division of data in ER diagram.

3. Conceptual: the level of abstraction which the Entity-Relationship Model most concerned with.

4. Consider the following relationship involving two entities, students and classes: A student can take many classes. A class can be taken by many students. The number of tables which can be used to represent this relationship in a schema is 3 because we are having three (3) parameters which are simply the students and the two entities.

In database management, the term "schema" is used to denote a representation of data.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

You might be interested in
Problem: you need to write a code that read 2 array of size 10x10 of zero and ones that represent black
castortr0y [4]

Answer:

import java.util.Scanner;

import java.lang.*;

public class Main

{

       //variables declared static; to be used inside main()

       static int err;

    static int size=10;

    //arrays declared static; to be used inside main()

       static int[][] white = new int[size][size];

       static int[][] black = new int[size][size];        

   //method to recognize any errors in the image    

   static int recognition(int[][] img)

   {

       //variable to indicate any error

       int notImage=0;

       if(img[1][1]==0)

       {

           for(int l=0;l<size; l++)

           {

               for(int k=0;k<size; k++)

               {

                   if(img[l][k]!=0)

                       notImage++;

               }

           }

       }

       else

       {

           for(int l=0;l<size; l++)

           {

               for(int k=0;k<size; k++)

               {

                   if(img[l][k]!=1)

                       notImage++;

               }

           }

       }

       if(notImage!=0)

           return -1;

       else    

           return 0;

   }

public static void main(String[] args) {

    Scanner sc = new Scanner(System.in);

 System.out.println("Enter the elements for 2d black array of size 10(enter 0): ");

 for(int l=0;l<size; l++)

       {

           for(int k=0; k<size; k++)

           {

               white[l][k]=sc.nextInt();    

           }

       }

 System.out.println("Enter the elements for 2d white array of size 10(enter 1): ");

 for(int l=0;l<size; l++)

       {

           for(int k=0; k<size; k++)

           {

               black[l][k]=sc.nextInt();    

           }

       }

 err = recognition(white);

 if(err==-1)

     System.out.println("White image has errors.");

 else    

     System.out.println("White image does not has errors.");

 

    err = recognition(black);

 if(err==-1)

     System.out.println("Black image has errors.");

 else    

     System.out.println("Black image does not has errors.");

}

}

OUTPUT

Program tested for smaller sizes.

Explanation:

1. Two two dimensional integer arrays are declared.

2. The variable size is declared and initialized to 10.

3. The main() prompts the user to enter the elements for both arrays; 1 for white and 0 for black.

4. Both the arrays are initialized inside two for loops independently.

5. These arrays are passed as parameter to the method, recognition(), one at a time.

6. Inside recognition(), an integer variable, notImage is declared and initialized to 0. If any other integer, other than 0 or 1 is encountered in the respective arrays, this variable is initialized to -1.

7. Inside main(), an integer variable, err, is declared. This variable stores the value returned by recognition().

8. Depending on the value of variable, err, message is displayed to the user appropriately.

3 0
3 years ago
How do you code a website?
slega [8]

Answer:

Learn the basics of HTML.

Understand HTML document structure.

Get to know CSS selectors.

Put a CSS stylesheet together.

Get Bootstrap.

Pick a design.

Customize your website with HTML and CSS.

Add content and images.

Explanation:

5 0
3 years ago
Your son is complaining that his smartphone is broken. He tells you that he cannot connect to the internet, nor can he make or r
ycow [4]

Answer:

the correct and only reasonable answer is option B

3 0
2 years ago
What is the name of the most common connector type used for providing power to various hardware components inside computer case?
user100 [1]
The answer is the molex.
4 0
4 years ago
Which command provides the source reference on the last page of a document?
Elina [12.6K]

Reference command provides the source reference on the last page of a document.

3 0
4 years ago
Read 2 more answers
Other questions:
  • A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
    5·1 answer
  • Which statement is correct? (Note: Our selectionsort picks largest items first.) A. The algorithm might be either selectionsort
    9·1 answer
  • The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
    12·1 answer
  • WHY IS BRAINLY NOTIFICATIONS LIKE THIS?????
    15·2 answers
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • Explain why the computer is powerful working tool???​
    7·1 answer
  • Malware is any malicious software installed on a computer or network without the owner’s knowledge.
    10·1 answer
  • Jason is using his mother's computer. He plugs in his flash drive, but it does not appear in the explorer window. Suggest what J
    12·1 answer
  • You just upgraded five computers with new, larger, hard drives. Now you would like to securely repurpose the old hard drives so
    13·1 answer
  • Frank - as the Scrum Master of a Scrum Team - is invited for a Daily Scrum meeting at 9am. The teamgets together in front of the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!