1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lena [83]
2 years ago
14

Need answer ASAP!!!!

Computers and Technology
1 answer:
kaheart [24]2 years ago
6 0

Answer:

I am looking at it. Of course I can't  move anything. But I think relationship matches cardinality and entity matches entity name. Entities and entity relationships were what we used years ago when I was involved with designing hierarchical databases.

you will get a 8 out of 10 score for this

 

You might be interested in
When Clara accesses the programs and documents on her computer by way of icons, she is said to be employing
galben [10]
The Correct answer is B.graphical user interface.
5 0
2 years ago
Which of the following represent typical account fees?
Tresset [83]
The correct answer is ATM fee, Service fee, and Minimum balance fee - all of these fees represent typical account fees.
An ATM fee is the couple of dollars that you have to pay when you withdraw your money from an ATM. Minimum balance fee refers to the fee that is paid if you want to keep your bank account "alive." And service fee you pay for certain banking services. There is no fee for routing number.
3 0
2 years ago
is a specific system for gathering information from a single group of respondents by continuously monitoring the advertising, pr
irga5000 [103]

Answer:

The answer is "Scanner based research".

Explanation:

A scanner focused testing method allows advertisers to track the exposure and response of a consumer panel to variables like ads, promotions, store displays, packaging, and quality.  

  • This technique is used to buy is considered a total answer because the received outcomes are not conditional on test survey results.
  • The purpose of this method is used to support the framework for marketing decisions.
3 0
3 years ago
How do you think computers have helped to improve documentation, support and services within the healthcare industry.
AfilCa [17]
Before the use of technology such as computers, information was documented through papers separated in folders. This was a very long and complicated process as people would have to find information by hand, sorting through countless documents. Now, it is much easier and neater to keep information. It can be as easy as digitally searching for someone's name and the computer will sort through countless documents, finding the one you need almost instantly. It is also much less wasteful and safe, as before computers, the use of paper was the only way to permanently keep information, also making documents vulnerable to being lost or stolen.
4 0
3 years ago
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
3 years ago
Other questions:
  • Create a class named BaseballGame that contains data fields for two team names and scores for each team in each of nine innings.
    12·1 answer
  • How do optical discs store data? select one:
    15·1 answer
  • Your task is to write and test a function which takes one argument (a year) and returns True if the year is a leap year, or Fals
    5·1 answer
  • i need to also do a algorithm where if the total is a even number 10 points are added to the score and if the total is odd then
    11·1 answer
  • What is the awnser ?
    11·1 answer
  • How to delete Brainly account ?​
    12·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • Hi I need help with an assignment. We're learning about encryption and decryption in code.org. i need help with three of the tex
    14·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • What is one of four key principles of Responsible Artificial Intelligence
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!