1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
15

Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?

Computers and Technology
1 answer:
muminat3 years ago
5 0

Answer: I think it’s D

Explanation: the rest apply to the the rules of 1NF and 2NF

You might be interested in
The management of Ventura Inc. approves the purchase of a few computers for the sales team. The management wants only the most b
BaLLatris [955]

Answer:

Ventura Inc requires only System software's

Explanation:

The system software has three major functions which are:

1. File and disk management: this involve managing of files in the system, when user want to save, move, copy, delete and rename files, The system software will handle those task

2. Allocating system resources: The system resources such as time, memory, data input and output are  allocated by the system software. The main memory is managed by the system software to avoid conflict among various task.

3. Monitoring system activities:  The system security and system performance is also monitored by the system software.

The first two functionalities are the requirement of ventura inc  

8 0
3 years ago
Structure for forloop?
solong [7]

Answer:

for ( initialization; condition;increment)

{

code goes here;

}

in python:

for i in list/range:

code with proper indentation

By initialization above we mean, like int i=0; etc.

By condition like i<10;

and by increment it means like i++, ++i or i+=1; etc

And in python, i can be an integer value if the range is mentioned, and it can be an item of a list if the list is used. We can also use an array, string and various other data structures in python. like we can have characters in a string and so on.

Explanation:

Please check the answer section.

8 0
3 years ago
What type of internet connection do you think you'd get in Antarctica?
rusak2 [61]
Hello!
My best guess is you would have to use mediocre satellites that float over for internet connection.
3 0
3 years ago
Read 2 more answers
Lisa is making a presentation for her project and she wants to use the logo of her company in her presentation. Which element wo
dalvyx [7]
Alignment because it will be simple and not complicated and will of course stand out for the person who is looking at the presentation.
5 0
3 years ago
Read 2 more answers
What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
NemiM [27]

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

7 0
3 years ago
Other questions:
  • The following is true about SPAM ________.
    9·1 answer
  • What effects will the different types of lighting produce on mountains?
    15·1 answer
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • What is the difference between an embedded image and an attached image
    7·2 answers
  • What is data? and types ??
    9·2 answers
  • Anyone here good with python coding. I have some machine learning homework which I am having a hard time with,
    12·1 answer
  • Haley is responsible for checking the web server utilization. Which things should she review while checking the server utilizati
    8·2 answers
  • Users can customize their Windows device by going to the Control Panel under __________.
    15·2 answers
  • Select the correct answer.
    15·1 answer
  • A small network that consists of devices connected by Bluetooth, such as a smartphone and a computer, is referred to as a ______
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!