1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
13

Multi-part question:

Computers and Technology
1 answer:
STatiana [176]3 years ago
8 0

Answer:

part 1:

Explanation:

You might be interested in
A startup company is using an excel spreadsheet to keep track of the billable hours that each employee spends on a project. As y
s2008m [1.1K]

Answer:

Hello there! There are 4 parts to this question, all regarding relational database concepts.

Explanation:

Parts 1, 2, 3, 4 are drawn in attachments. For Part 4, the "foreign keys" would be the id fields of the joining table, and the "primary keys" are the IDs of the table itself. Data types are "integer" for ID, "string" for text columns like Name and Location, and "Decimal" for Hourly rate in the Timesheet table. Note that we can further simplify the erd from the one constructed earlier in part 3 to remove the Project Manager model and instead add a Project Manager "boolean" flag in the Employee table since a Project Manager is also an Employee.  

6 0
3 years ago
Progressive places its messages on local radio stations and in the yellow pages of the phone book. These communications are dire
Alexandra [31]

Answer: Receiver

Explanation:  

The receiver basically is used in the communication channel where the person decode its output and message in the form of useful data or information.

The main function of the receiver is to provide the path between the transmitter as an output and receiver as an input. The receiver basically process the received signal for recovering the proper message signal. It basically receive the input signal and covert it into useful data.

7 0
3 years ago
Which is the right answer
Maksim231197 [3]

Answer:

B

Explanation:

I think.

5 0
3 years ago
Read 2 more answers
Your organization's IT department has developed a custom application that reports the hostname of each client that tries to acce
Andrews [41]

Answer:

Configure DC1 to forward name resolution requests to 192.168.3.0

Explanation:

DC1 is configured in order to use forwarders so that they can send unresolvable host name requests to a DNS server at the main office or the head quarters.

This also prevent sending of DNS spoofing attack  to a DNS client

5 0
3 years ago
You are configuring a RAID drive for a Media Streaming Server. Your primary concern is the speed of delivery of the data. This s
babymother [125]

Answer:

Raid 0

Explanation:

Raid 0 is a configuration used for speed priority. Datas are stored differently on each disk

3 0
2 years ago
Other questions:
  • What is a WYSIWIG program
    10·1 answer
  • A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. web-bas
    14·1 answer
  • Can your computer become infected with a virus via email
    6·1 answer
  • Why is the Vigenere cipher hard to crack? (select 2)
    6·1 answer
  • A derived character that is shared by all members of a clade is called a ______________ of that clade.
    6·1 answer
  • What is the most effective way to demonstrate being prepared for an interview?
    8·2 answers
  • If an individual receives 1.8 mGy while standing 4 ft from a source of radiation for 2 minutes, which of the following option(s)
    9·1 answer
  • You can enter _____ in a cell to display tomorrow’s date
    12·1 answer
  • Took some photos today for photography class what do you think??
    13·2 answers
  • 1110011*110011 binary multiplication
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!