1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
I am Lyosha [343]
3 years ago
6

Sarah maintains a blog about her soap-making business, and she has hired someone to create a database for this business. She mak

es bar and liquid soaps in a variety of scents from different types of ingredients. She sells these soaps in certain incremented quantities to customers around the world. Which is one table the database planner will most likely create?
the number of followers for Sarah’s blog
Sarah’s favorite scents
the number of hours Sarah researches ingredients
customer contact information
Computers and Technology
1 answer:
ivann1987 [24]3 years ago
4 0
The database planner would most likely create a table that contains customer contact information since these would be the individuals who placed an order for Sarah's products after visiting her blog. 
You might be interested in
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
4 years ago
I will give brainliest !!
OverLord2011 [107]
Do these questions have given answers already?
3 0
3 years ago
What are the text or graphics that are lighter than the main text located in a document's background called?
faust18 [17]
That would be a watermark
7 0
3 years ago
Finish the code where it says //YOUR CODE HERE
victus00 [196]

Answer:This is basically the issue of permutations and calculations. It revolves around the best depiction of accuracy.

Explanation: It hitherto explains the nitty-gritty of our day-to-day activities in connection with our social interactions and securities...

6 0
3 years ago
Write c++ program from 1to 100 to find prime numbers using statement.​​
olasank [31]

#include <iostream> using namespace std; int isPrimeNumber(int); int main() { bool isPrime; for(int n = 2; n < 100; n++) { // isPrime will be true for prime numbers isPrime = isPrimeNumber(n); if(isPrime == true) cout<<n<<" "; } return 0; } // Function that checks whether n is prime or not int isPrimeNumber(int n) { bool isPrime = true; for(int i = 2; i <= n/2; i++) { if (n%i == 0) { isPrime = false; break; } } return isPrime; }

5 0
3 years ago
Other questions:
  • .exe, .msi, .msp, .inf - together, what do these filetypes indicate
    12·2 answers
  • I have two questions: 1: how do you credit only 5 points on brainl? (mine is only letting me give 10) and 2. How do I get a bria
    6·2 answers
  • What is a fragmented disk?
    14·1 answer
  • How does color affect your mood?
    11·2 answers
  • What were second generation languages that required detailed knowledge of the computer's hardware and a lot of spare time to wri
    11·1 answer
  • Star and peer-to-peer are types of
    9·2 answers
  • Discuss at least 1 Microsoft Windows security features that could protect data?
    5·1 answer
  • .13 LAB: Library book sorting Two sorted lists have been created, one implemented using a linked list (LinkedListLibrary linkedL
    14·1 answer
  • You compared each letter in the correct word to the letter guessed.
    5·1 answer
  • How do you get a blank business card template in word?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!