1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bess [88]
4 years ago
9

Which relationship is possible when two tables share the same primary key?

Computers and Technology
2 answers:
jek_recluse [69]4 years ago
8 0

The answer to this problem is A, one-to-one.

lianna [129]4 years ago
4 0

The correct answer is many-to-one

This kind of relationship is likely to happen when two tables share the same primary key because one entity had values that are related to another one that has distinctive values. It is usually applied by primary key relationships and the relationships normally are between fact and dimension tables and levels in hierarchy as well.  

You might be interested in
A student that earns a well qualified score on an ap exam would receive a ___
elena55 [62]

Ap exams are scored on a scale of 1 to 5. A score of 5 means that the student is extremely well qualified to receive college credit for that course. But the answer to this would be 4. When someone gets a 4 it means they are well qualified.

Answer: 4

3 0
3 years ago
To type the letter address, _________ space from the dateline
miskamm [114]

Answer: Double

Explanation:

I just took the test

4 0
3 years ago
Read 2 more answers
Use search engines and websites to research the following WAN technologies to complete the table below:
Yuki888 [10]

Answer:

Explanation:

I am attaching the table as an image with updated table containing required information for the following WAN technologies.

T1/DS1 => Digital Signal 1 (T-Carrier 1),

T3/DS3 => Digital Signal 3 (T-Carrier 3),

OC3 (SONET) => Optical Carrier 3 (Synchronous Optical Networking),

Frame Relay,

ATM => Asynchronous Transfer Mode,

MPLS => Multi-protocol Label Switching,

EPL => Ethernet Private Line.

Although you have mentioned most of the information yourself, there were some wrong data in it.  So I have updated them with correct information in the attached table.

4 0
3 years ago
Read 2 more answers
If you've finished working with a data file but intend to work on it again during your work session, which button would you use
mariarad [96]
Hey there! Hello!

So, not sure if there's actually a button to "close out" a window to where you're able to reopen it again without having to go to where the file is located or go to recents in your application. Keep in mind that I'm on a MacBook, but I have worked on a Windows computer before. 

One thing you can do is minimize the window. Your program will remain open, but your window will remain out of your way until you decide to expand it again. This seems to be the closest thing possible to your description, but if you had something else in mind, I'd love to hear more details.

This won't be a good solution if you're looking to cut down on the energy that certain programs may be taking up while open, even if you're not using them. But in terms of getting the windows off your desktop, minimizing is the way to go. It also allows you to have documents/windows out of the way while still being able to work on other documents/windows in the program (i.e. Microsoft Word, Google Chrome, Pages, etc.)

Hope this helped you out! Feel free to ask me any additional questions you may have. :-)
5 0
3 years ago
Read 2 more answers
Design a class named QuadraticEquation for a quadratic equation ax^2+bx+x=0. The class contains: **private data fields a, b, and
LenaWriter [7]

Answer:

<em>C++</em>

///////////////////////////////////////////////////////////////////////////////////////////

#include <iostream>

using namespace std;

//////////////////////////////////////////////////////////////////

class QuadraticEquation {

   int a, b, c;

   

public:

   QuadraticEquation(int a, int b, int c) {

       this->a = a;

       this->b = b;

       this->c = c;

   }

   ////////////////////////////////////////

   int getA() {

       return a;

   }

   

   int getB() {

       return b;

   }

   

   int getC() {

       return c;

   }

   ////////////////////////////////////////

   // returns the discriminant, which is b2-4ac

   int getDiscriminant() {

       return (b*2)-(4*a*c);

   }

   

   int getRoot1() {

       if (getDiscriminant() < 0)

           return 0;

       else {

           // Please specify how to calculate the two roots.

           return 1;

       }

   }

   

   int getRoot2() {

       if (getDiscriminant() < 0)

           return 0;

       else {

           // Please specify how to calculate the two roots.

           return -1;

       }

   }

};

//////////////////////////////////////////////////////////////////

int main() {

   return 0;

}

4 0
4 years ago
Other questions:
  • What is required to control access to the file system using file and folder permissions on a windows based computer?
    8·1 answer
  • Written and artistic expressions are protected by
    8·1 answer
  • Technologies can offer safety and protection for people
    11·1 answer
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    13·1 answer
  • PLEASE HURRY I WILL GIVE BRAILIEST TO WHO EVER ANSWERS AND IS CORRECT
    14·2 answers
  • What is the next line?
    7·1 answer
  • What blockchain implementation resulted from bitcoin’s rejection of a recommendation to enhance its scripting language support?
    9·1 answer
  • Select the four bad password ideas.
    13·2 answers
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
  • Consider a game that is searched using random restart hill climbing strategy. Assume that the success rate for the game is 25%.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!