1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cestrela7 [59]
3 years ago
7

Normalization works through a series of stages called normal forms. For most purposes in business database design, _____ stages

are as high as you need to go in the normalization process.
a. two
b. three
c. four
d. five
Computers and Technology
2 answers:
rusak2 [61]3 years ago
6 0
I do believe it’s A.....
Agata [3.3K]3 years ago
6 0
B is the correct answer
You might be interested in
You are required to justify the need to implement a three-tier campus network. Which justification below makes sense for a three
Murrr4er [49]

Answer:

Correct answer is (d) Scalable solution for an enterprise environment

Explanation:

Scaling and enterprise simply means adding up resources to the business need. By adding hardware (s) or by upgrading the existing hardware without changing much of the application, one will be able to implement a three-tier campus network.

8 0
3 years ago
Stella is a bank executive. She is preparing a spreadsheet on the loan repayment schedules of customers. Which function can she
den301095 [7]

Answer: The function Stella can use to calculate the periodic payments of a loan is:

The Excel PMT function or NPER function.

Explanation: 1. The Excel PMT function is a financial function that returns the periodic payment for a loan.

2. The NPER function to figure out payments for a loan, given the loan amount, number of periods, and interest rate.

7 0
3 years ago
Which of the following is the safest authentication method?
myrzilka [38]

The safest authentication method is authentication using a smart card.

Smart Card Authentication uses a physical card along with a smart card reader and software on the workstation to validate users into enterprise resources like workstations and applications. Although smart card authentication offers a terrible user experience and is expensive to deploy and maintain, it is very secure.

Because smart card authentication requires a physical credential, a hardware card reader, and software, it is expensive and difficult to administer. Smart cards are only used in the most secure workplaces, such as three-letter agencies of the federal government or privileged access at a financial institution, as these environments frequently forbid employees from carrying smartphones to and from work.

To learn more about Authentication click here:

brainly.com/question/17217803

#SPJ4

6 0
2 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
To open the find and replace dialog box with shortcut keys, hold down ctrl and press ________
ratelena [41]
Hi. To open the find and replace dialog box with shortcut keys, hold down CTRL and press the letter "H". 

Hope this helps.
Take care.
8 0
4 years ago
Other questions:
  • In databases and database-related software, which choice is not a Boolean operator?
    7·2 answers
  • Under what circumstances would it be appropriate to use the sentence method of note taking, and what are the advantages and disa
    7·2 answers
  • Using ______, a smartphone can connect to an automobile audio/control system
    6·1 answer
  • You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform
    9·1 answer
  • How a hard drive works
    8·1 answer
  • What are the pros and cons of using the internet in a medical office setting?
    7·1 answer
  • Do most web queries have fully meets results
    11·1 answer
  • Suppose you have the following declaration.char[] nameList = new char[100];Which of the following range is valid for the index o
    7·1 answer
  • The L-exclusion problem is a variant of the starvation-free mutual exclusion problem. We make two changes: as many as L threads
    15·1 answer
  • NEED HELP! BRAINLIEST FOR WHOEVER ANSWERS CORRECTLY FIRST!!!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!