1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
11

The _____ model was developed to allow designers to use a graphical tool to examine structures rather than describing them with

text.
Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
8 0

Answer:

The correct answer to the following question will be "Entity relationship".

Explanation:

  • A relationship model for describes interlinked interests in a particular field of knowledge.
  • A ER model consists of the types of entities that classify matters of interest and specify relationships around entities that may be instances.
  • A relationship model of entity is a visual representation of entities and their relationships, usually used for data organization in databases or data systems in the form of a computer model or even as an entity interaction diagram.

Therefore, "Entity-relationship" is the right answer.

You might be interested in
Does anyone know python 3? my code isnt working and i dont know anyone who can help me​
Gekata [30.6K]

Answer:

One of the most important skills you need to build as a Python developer is to be able to run Python scripts and code. This is going to be the only way for you to know if your code works as you planned. It’s even the only way of knowing if your code works at all!

This step-by-step tutorial will guide you through a series of ways to run Python scripts, depending on your environment, platform, needs, and skills as a programmer.

Explanation:

7 0
3 years ago
Does anybody have the code to 2.19.4: Guess a Number 2.0 in codeHS??
Tcecarenko [31]

Answer:

speed(0)

secret_number = 9

pensize(10)

def green_check():

   color("green")

   penup()

   backward(25)

   right(45)

   pendown()

   forward(35)

   left(90)

   forward(75)

   

def draw_arrow():

   color("red")

   left(90)

   forward(50)

   left(45)

   backward(25)

   forward(25)

   right(90)

   backward(25)

   forward(25)

   left(45)

   backward(100)

   forward(50)

   right(90)

   

user_number = int(input("Guess a number between 1 and 10: "))

while user_number != secret_number:

   if user_number < secret_number:

       draw_arrow()

   else:

       left(180)

       draw_arrow()

       right(180)

   user_number = int(input("Guess a number between 1 and 10: "))

   clear()

   

green_check()speed(0)

secret_number = 9

pensize(10)

def green_check():

   color("green")

   penup()

   backward(25)

   right(45)

   pendown()

   forward(35)

   left(90)

   forward(75)

   

def draw_arrow():

   color("red")

   left(90)

   forward(50)

   left(45)

   backward(25)

   forward(25)

   right(90)

   backward(25)

   forward(25)

   left(45)

   backward(100)

   forward(50)

   right(90)

   

user_number = int(input("Guess a number between 1 and 10: "))

while user_number != secret_number:

   if user_number < secret_number:

       draw_arrow()

   else:

       left(180)

       draw_arrow()

       right(180)

   user_number = int(input("Guess a number between 1 and 10: "))

   clear()

   

green_check()

Explanation:

It's right

6 0
3 years ago
One vulnerability that makes computers susceptible to walmare is:
sammy [17]
C hope it’s right :))) !
6 0
3 years ago
Read 2 more answers
A customer bought a goods for Rs.9,000 after getting 10% discount. Calculate the marked price of the goods.Write in Qbasic.​
Darina [25.2K]

Answer:

Rs. 10,000

Explanation:

10% discount means,

customer bought the things at 100% - 10% = 90%

so if 90% --> 9000

1% --> 100

total price = marked price which is 100%

100% ---> 100*100 = Rs. 10,000

7 0
2 years ago
Read 2 more answers
What is denial service attack?
Korolek [52]

Answer:

a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet

3 0
3 years ago
Read 2 more answers
Other questions:
  • Can someone please help me with this question?
    12·1 answer
  • Which of the following keys on a keyboard allows you to select multiple cells located in different parts of your worksheet?
    13·2 answers
  • In which scenario would someone want to use the Paste Link option?
    7·1 answer
  • g Write a program that prompts the user for an integer n between 1 and 100. If the number is outside the range, it prints an err
    5·1 answer
  • Write a short program that allows the user to input a positive integer and then
    5·1 answer
  • Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with th
    15·2 answers
  • You can count on everything online to be 100% accurate. <br> A. FALSE <br> B. TRUE
    11·2 answers
  • The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.
    10·1 answer
  • If there is a combination of two or more attributes which is being used as the primary key then we call it as
    12·1 answer
  • Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused a
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!