1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pantera1 [17]
3 years ago
5

explain the key reasons why entity relationship modeling is important, and determine at least (1) way in which it impacts the ov

erall development of the database.
Computers and Technology
1 answer:
Dimas [21]3 years ago
7 0

1st step in the data base design is data modeling. Data modeling involves conceptual data modeling and physical data modeling. E-R modeling is widely using to tool for conceptual data modeling.

A data model describes the structure of a database. Structure of data means describing the entities involved in the data base and their attributes, relationships among the entities, keys on entities , constraints etc… That is, the E-R model gives the clear picture about the database.

E-R modeling is a communication tool. It helps the data base designer to develop a good data base that meets the end users and application programmers. Especially, E-R modeling gives a pictorial representation of the database. Thus, the database designer can understand the data base description easily.

Therefore, unless the data base is modeled well, database cannot be developed well.

You might be interested in
in python i wrote a function where if the user inputs a certain word the function repeats over again, since the function aaks fo
Colt1911 [192]
Check out the counter set
4 0
3 years ago
End users have complained that when they click a link on your company's Website, the wrong client loads. You review the page wit
Ilia_Sergeevich [38]

Answer:

4. A Web server has been specified.

Explanation:

End users have complained that when they click a link on your company's Website, the wrong client loads. You review the page with the suspect link and find the following HTML code:

To begin an FTP session, click the following link:

FTP Session

The problem is that Web server has been specified.

7 0
3 years ago
Identify measures to protect your computer against threats from human actions. You cannot access a file in a computer that belon
scZoUnD [109]

Answer:

Firewalls

Explanation:

A firewall is simply a network security system whose main duty is. to prevent unwanted access to. private network.

Firewalls is measures to protect your computer against threats from human actions.

It is also the one singular thing that prevents you from accessing the file on your friends system.

5 0
3 years ago
Which extra step do verizon devices require for fenrir to be allowed to connect to the device?
madam [21]

Differentiation creates a competitive edge based on the distinctiveness of the product. Uniqueness is created by a variety of potential factors.

<h3>What is the Verizon device program?</h3>

The program for device payments: requires you to sign a contract promising to pay for the item in regular installments until the balance is paid. You have the option of paying the gadget off in full at any moment, or you can pay the installments over the course of the entire term.

Instead of paying for your equipment in full up front, Verizon device payment allows you the freedom to upgrade early and spread out your payments over 36 months. Until the full retail price of your item is paid off, you'll make manageable monthly payments.

Differentiation is Verizon's general business approach. Differentiation creates a competitive edge based on the distinctiveness of the product. Uniqueness is created by a variety of potential factors.

To learn more about the Verizon device program refer to:

brainly.com/question/13696647

#SPJ4

8 0
2 years ago
What are some ways in which reading and writing have changed in our newly networked world
olga_2 [115]
Reading and writing have given us both a way to pass on knowledge and learn things we cant learn first hand.<span />
3 0
4 years ago
Other questions:
  • Using the notation exemplified in following question , list a set of tables and attributes (and identify keys) to represent the
    10·1 answer
  • __________ is a collection of formatting options—such as a frame, a rounded shape, and a shadow—that changes a picture’s overall
    5·1 answer
  • What methods would you add to make this class declarationvery useful?
    11·2 answers
  • Write a 3-4 page paper (500-800 words) about your project that explains your project, the type of conditioning you used, and the
    10·1 answer
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • Can someone please help me to point out what's wrong with this C program:
    13·1 answer
  • Which of the following is a table which can be rearranged to analyze data in a variety of ways?
    13·1 answer
  • Pls help it’s on a test!! no links :) you can zoom in if hard to read
    15·1 answer
  • What type of software is developed by volunteers, contains code in the public domain, and helped to make Linux popular
    13·1 answer
  • Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!