answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cupoosta [38]
2 years ago
9

Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be

taken by many students.
How many tables can be used to represent this relationship in a schema?

A. 1

B. 2

C. 3.

D all of them
Computers and Technology
1 answer:
ad-work [718]2 years ago
3 0

Answer:

3

Explanation:

ER model can be used and is based on three basic concepts: Entities, Attributes & Relationships.

An entity can be place, person, object, event or a concept, which stores data in the database.

Relationship is nothing but an association among two or more entities. A weak entity is a type of entity which doesn't have its key attribute.

You might be interested in
NTDS Quotas store NT Directory Service quota information that limits the number of Active Directory objects a user, group, compu
Anna35 [415]

Answer:

The anwer is advanced feature folder

Explanation:

Because NTDS QUOTAS is an advanced feature folder that stores NTDS quota information that limits the number of Active Directory objects a user, group, computer, or service can create.

3 0
2 years ago
Which variable name is the best to hold the area of a rectangle?<br> 1A<br> area<br> AREA<br> a
Fantom [35]

Answer:

Area

Explanation:

The variable name is the best to hold the area of a rectangle is area

plz give brainliest

3 0
2 years ago
A small company has developed a specialized software product that it configures specially for each customer. New customers usual
egoroff_w [7]

Answer:

It would be good for the company to make the item open source since it lessens the progression costs and attempts.

If turned into open source then the code would be available to the customers and are they could to take off upgrades and modify it to their own specific needs. It reduces the company's efforts, satisfies the customers whilts including them.

6 0
2 years ago
Which of the following is true with regard to defensive programming? Preconditions should never be visible to callers. Program c
Firlakuza [10]

Answer:

The correct point about defensive programming is that the "program code frequently assumes that input will be valid and that algorithms will behave as expected".

Explanation:

8 0
2 years ago
Which of the following are examples of algorithms? (Select all that apply, if any do.)
Travka [436]

Answer:

A. The mathematical formula for finding the area of a circle.

D. Instructions for setting up a new DVD player

E. A series of steps that moves a "lighting bot" around to turns on lights.

Explanation:

Algorithm is a systematic procedure (or process) that produces the answer to a question or the solution of a problem in a finite number of steps.

Option A is an algorithm. The mathematical formula for finding the area of a circle gives a solution to a problem. The problem is finding area of a circle and the formula gives the step by step procedure finding the area of a circle.

Option B is not an algorithm. Option B just provide a list of your favourite animals and it doesn't answer a question we know about.

Option C is not an algorithm. A problem statement is still a problem with no solution whereas algorithm provides solution

Option D is an algorithm. It provides the step by step procedures for setting up a new DVD player

Option E is an algorithm. It provides a series of steps that moves a lighting bot around to turns on lights, so it provides a solution.

4 0
2 years ago
Read 2 more answers
Other questions:
  • Which telecommunications device is widely used in industries that require closed communication?
    7·2 answers
  • The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
    6·1 answer
  • Consider the following code: x = 17 y = 5 print (x % y) What is output?
    10·1 answer
  • Explain the following instructions: ADD 3000, 1050, 1900.
    12·1 answer
  • Together with some anthropologists, you’re studying a sparsely populated region of a rainforest, where 50 farmers live along a 5
    15·1 answer
  • You cannot change data directly in the PivotTable. Instead, you must edit the Excel table, and then ____, or update, the PivotTa
    9·2 answers
  • Design an algorithm for a bounded-buffer monitor in which the buffers (portions) are embedded within the monitor itself."
    10·1 answer
  • As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (no
    9·1 answer
  • 9.6 Code Practice: Question 1
    9·1 answer
  • Modify the TimeSpan class from Chapter 8 to include a compareTo method that compares time spans by their length. A time span tha
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!