Answer:
Explanation:
The underlined traits in the ER chart speak to essential key since they remarkably recognize the quality
(a)
(I) The level of the given relationship is 2 i.e it is a parallel connection among Book and Publisher. It is a one to numerous relationship from distributer to book in light of the fact that a distributer can distribute any number of books however a book will have only one publisher,so the cardinality will be 1 to 1..* (one to many)
(b)
(i) The degree of the given relationship is 2 i.e it is a binary relationship between Author and Book. It is a many to many relationship from Book to Author a book can be written by one or more authors and an author can write more than one book, so the cardinality will be 1..* to 1..* (many to many)
(c)
(i) As mentioned in part (b), the degree of given relation is 2 and cardinality is many to many (1..* to 1..*)
(d)
(i) The degree of the given relationship is 1 i.e unary relationship. It is a many to many relationship because one book can belong to any sets and a set can have any number of books, so cardinality is 1..* to 1..* (many to many)
Note: attached below is the image of various options to confirm the explanation (answer).
cheers i hope this helped !!!
Answer:
<u>C program to find the sum of the series( 1/2 + 2/3 + ... + i/i+1)</u>
#include <stdio.h>
double m(int i);//function declaration
//driver function
int main() {
int i;
printf("Enter number of item in the series-\n");//Taking input from user
scanf("%d",&i);
double a= m(i);//Calling function
printf("sum=%lf",a);
return 0;
}
double m(int i)//Defining function
{
double j,k;
double sum=0;
for(j=1;j<i+1;j++)//Loop for the sum
{
k=j+1;
sum=sum+(j/k);
}
return sum;
}
<u>Output:</u>
Enter number of item in the series-5
sum=3.550000
Answer:
The correct answer for the following question will be A. Cipher code.
Explanation:
Cipher code:
Ciphers are potentially the cryptographic central pillar. A cipher is usually an algorithm to perform both encryption and decryption.
Secret key encryption relies on the use of symmetric ciphers. Whether the goal is to convert plaintext to ciphertext and vice-versa. The secret key is shared on both ends, and the person having the secret key can only encrypt and decrypt the data.
So, option A is a suitable answer.
Answer: Literally click on it and hold, then just drag it to wherever you want it
Explanation: Hope this helped you
Answer:
B: Use the prototype and revise and enhance the prototype.
Explanation:
Before going ahead to execute any project, one must define the requirements for the project. It is only after the requirements for the project is known that one can go ahead to develop the prototype, use the prototype, revise and then enhance the prototype.