1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
9

one business rule is that each project has one manager. Identify two (and no more than two) problems with the data structure or

inconsistencies with the data contents. Do not duplicate answers already posted by other students. Indicate why the items you posted are an issue. Specify how a database management system (DBMS) could be used to preclude the problem.
Computers and Technology
1 answer:
Vinil7 [7]3 years ago
3 0

Answer:

1. The data will not be tallying up - there will great variations and deviance.

2. There will be not enough data points

Explanation:

The management style, though it uses one manager, is not devoid of problems in the system. For example, there will be great difficulty in the collection of accurate data to properly define the system. This presents a great misinformation on the outcome of the data process. This is likely to be caused by the first factor that is the data having a lot of discrepancies. The discrepancy causes the data to be meaningless in terms of the trends displayed. In addition, the lack of enough points posses a challenge to the data collection and processing procedure. The data base management system can be used to concentrate data on a central point of reference.

You might be interested in
You are helping a friend in college with his network connection. He would like a high speed connection between his computers so
inna [77]

Solution :

Set up the router as follows:

On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet $100/1000TX$ router with the firewall to the Workspace.

Connection of the router as follows:

Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a $LAN$ port on the router. Above the Dorm-$PC2$ computer, select $\text{back}$ to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e $RJ45$ cable. In the Selected Component window, drag the connector to the $LAN$ port on the computer. In the Selected Component window, drag the other connector to a $LAN$ port on the router. Select a Cat5e $RJ45$ cable. In the Selected Component window, drag a connector to the $WAN$ port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.

Provide power to the router as follows:

On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.

Request new $TCP/IP$ information from the router for Dorm-PC as follows:

On the $\text{Dorm-PC}$ monitor, select Click to view $\text{Windows 10}$.In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter $\text{ipconfig}$ /renew and press $\text{Enter}$ to request new $TCP/IP$ information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.

Configure Windows Firewall on $\text{Dorm-PC}$ as follows:

In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.

4 0
3 years ago
Would an artificial intelligence come into existence anytime in the next 30 years?
Scrat [10]
Artificial Intelligence, based on neural networks, is available now.
4 0
3 years ago
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
2 years ago
What are the considerations that go into representing information digitally? What are the trade-offs? What’s easy? What’s hard?
sineoko [7]
Hello!

The considerations that go into representing data digitally is that the data can be easily sent and interprated to people all over the world. However, one of the trade-offs of representing data digitally is that the information loses a "human" aspect. Instead of experimenting the data, you are simply reading it.

I hope you found this helpful! :)
3 0
3 years ago
Write a program that encrypts and decrypts a string of characters. Use a char array for this, not the string class. The maximum
dem82 [27]

Answer:

C++ code for encryption is given below

Explanation:

#include <iostream>

using namespace std;

//functions to encrypt and decrypt

void encrypt(char str[]);

void decrypt(char str[]);

int main(){

char str[200];

bool done = false;

while(!done){

cout << "Enter a string (enter * to stop): ";

cin.getline(str, 200);

if(str[0] == '*' && str[1] == '\0')

done = true;

else{

encrypt(str);

cout << "Encrypted: " << str << endl;

decrypt(str);

cout << "Decrypted: " << str << endl;

}

cout << endl;

}

}

void encrypt(char str[]){

int i = 1;

for(int j = 0; str[j] != '\0'; j++){

str[j] += i;

i++;

if(i == 11)

i = 1;

}

}

void decrypt(char str[]){

int i = 1;

for(int j = 0; str[j] != '\0'; j++){

str[j] -= i;

i++;

if(i == 11)

i = 1;

}

}

3 0
3 years ago
Other questions:
  • A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
    9·1 answer
  • Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect
    14·1 answer
  • #Electrical Engineering
    13·1 answer
  • What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
    15·2 answers
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • Who was responsible for the development of the rocket motor?
    13·2 answers
  • Which statement best describes the difference between a spreadsheet and a database?
    9·2 answers
  • Write bubblesort algorithm using random programming language
    13·2 answers
  • Kinda strange, and im good
    11·2 answers
  • the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!