Answer:
The answer to this question can be described as follows:
Explanation:
Relational data model:
The use of data tables to organize sets of entities into relationships requires a relational data model. this model work on the assumption, which is a primary key or code, that is included in each table configuration. The symbol for "relational" data links and information is used by other tables.
Model Design:
This model is used for database management, it consists of structure and language consistency. It is design in 1969.
Importance of data model:
This provides a common standard for processing the potentially sound data in machines, that was usable on almost any one device.
Big Data:
It moves to locate new and innovative ways to handle large volumes of authentication tokens and to gather business insights when offering high efficiency and usability at an affordable cost at the same time.
Answer:
the RAM if i am not mistaking
Penny Juice – bad design examples.
Blinkee website – bad design example.
Great Dreams I — bad designed website.
Answer:
// program in C++.
// headres
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// array
int temperatures[7];
// count variable
int count=0;
cout<<"Enter the temperature of all days:";
for(int a=0;a<7;a++)
{
// read temperature of 7 days
cin>>temperatures[a];
// find temperature is extreme or not
if(temperatures[a]<-10||temperatures[a]>25)
// count
count++;
}
// print count of extreme temperature
cout<<"number of days of extreme temperature:"<<count<<endl;
return 0;
}
Explanation:
Create an array of size 7 to store the temperature of all days of week.Read the temperature of each day.If the temperature is less than -10 or greater than 25 then increment the count.This will count the number of days of extreme temperature.Print the count.
Output:
Enter the temperature of all days:-20 12 18 30 32 -15 15
number of days of extreme temperature:4
I would a Standard Access control List
There are two common access lists: The standard and extended access list. With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.