Answer:
Logical Data Model
Explanation:
An Entity Relationship Diagram (ERD) is a model or a diagram designed to reveal the relationship between various entities such as people, places, objects, and so on within an institution. Entity relationship diagram is also known as Entity relationship model. This model is used to design relational database by various sectors such as education, engineering, business, etc.
<u>ERD is designed using conceptual data model, logical data model, and physical data model</u>.
The visual practice or model that gives more insight into the logical relations among the entity is the logical data model.
The logical data model is used to illustrate more detailed operational and relational data among the entities. It is more detailed than the conceptual data.
So, the correct answer is logical data model.
The correct answer of the given question above would be 24 BITS. The number of bits that are required to store the text of the number 150 in ASCII would be 24 bits. ASCII means American Standard <span>Code for Information Interchange. Hope this answer helps. </span>
Answer:
There are five work sheets in this excel file, they are equipment, company, company, person and computer. Excel worksheets are made up of cells, with the columns labelled alphabetically and the rows numbered.
Explanation:
The columns of a worksheet is called a field while row are called records. They are used to locate a cell in the worksheet. There are so many statistical, mathematical and engineering functions in excel. It is used to display the analysis of data.
Is this a question or answer? Either re-post correctly or ignore this.
The statement 'information systems (IS) users have no responsibility to follow security and backup procedures' is false.
Any kind of data that is available on the Internet has to be protected. All information users have the responsibility to follow the security procedures so that an unwanted circumstance does not arise. Hence, the statement above is false.
It is the responsibility of an organization to protect its data. For this reason, everyone, including the information systems (IS) users is entitled to follow security and backup procedures.
One should recognize that all these security and backup procedures are for our own security as data misplaced can be a loss to the whole organization. Security and backup procedures also help to keep data safe from hackers.
To learn more about information systems, click here:
brainly.com/question/25226643
#SPJ4