answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
2 years ago
7

Database management systems are expected to handle binary relationships but not unary and ternary relationships.'

Computers and Technology
1 answer:
alekssr [168]2 years ago
6 0

Answer:

False          

Database management systems are expected to handle binary, unary and ternary relationships.

Explanation:

Unary Relationship: It is a recursive relationship which includes one entity in a relationship which means that there is a relationship between the instances of the same entity. Primary key and foreign key are both the same here. For example a Person is married to only one Person. In this example there is a one-to-one relationship between the same entity i.e. Person.

Binary Relationships: It is a relationship involving two different entities.   These two entities identified using two relations and another relation to show relationship between two entities and this relation holds primary keys of both entities and its own primary key is the combination of primary keys of the both relations of the two entities. For example Many Students can read a Book and many Books can be obtained by a Student.

Ternary Relationships: is a relationship involving three entities and can have three tables. For example a Supplier can supply a specific Part of many Mobiles. Or many Suppliers may supply several Parts of many Mobile models.

You might be interested in
Dawn needs to insert a macro into a Word document. Where can she find the Insert Macro dialog box?
amid [387]

Answer:

Developer tab

Explanation:

Inserting the Macro dialog box can be confusing for many people because the "Developer tab," where it can be found, is <em>hidden by default</em> in Microsoft Word. In order to add this to the ribbon, all you have to do is to go to the File tab, then click Options. After this, click Customize Ribbon. Under this, choose Main Tabs, then select the Developer check box. The Developer tab will then become visible. You may now insert a macro.

6 0
2 years ago
Grabar microphone audio icon_person click each item to hear a list of vocabulary words from the lesson. then, record yourself sa
Vaselesa [24]

Because this is a on your own problem, it cannot be solved. You must speak to it after the person says something.

5 0
2 years ago
Read 2 more answers
Leena needs to manually update the TOC and would prefer not to change the styles in the document.
Lady_Fox [76]

<u>Answer:</u>

<em>Using References tab. Table of Contents group, Update Table </em>

<u>Explanation:</u>

Changes in the table of content is easy to do in word application. The changes might be only for a page number or heading or it might be anything. Based on the need, word allows you to do by using References tab.

<em>Step 1:</em><em> Goto References tab Contents group Update table </em>

<em>Step 2:</em><em> Choose Update Page number only to update only the page numbers in TOC. This would ignore the changes in headings. </em>

<em>Step 3:</em><em> Update Entire table would update the whole table. </em>

8 0
2 years ago
Read 2 more answers
1. PGP encryption can be performed from the command line as well. What is the PGP command line syntax to encrypt the my-message.
bekas [8.4K]

Answer:

1. From the command prompt, type:

pgp --encrypt "my-message.txt" --recipient "Sean" --output "secret-message.txt.gpg"

2. Press Enter.

Explanation:

From the command line, the above command is entered and Enter is pressed.

The command start with pgp, then it has different options:

--encrypt: this specifies the input file to be encrypted

--recipient: this specifies the specific user to which the file is been encrypted

--output: this specifies the name to which the output (encrypted file) is saved.

8 0
2 years ago
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
2 years ago
Other questions:
  • If a stadium pays $20,000 for labor and $13,000 for parking, what is the stadium's profit margin if the game generates $206,000
    7·2 answers
  • Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = '
    12·1 answer
  • Write a C program that inputs four strings that represent integers, converts the string to integers, sums the values and prints
    10·1 answer
  • Write a function called st_dev. St_dev should have one #parameter, a filename. The file will contain one integer on #each line.
    7·1 answer
  • Use Excel to develop a regression model for the Consumer Food Database (using the "Excel Databases.xls" file on Blackboard) to p
    13·1 answer
  • reAay ouyay aay hizway ithway igPay atin?Lay? (Translated: "Are you a whiz with Pig Latin?") Write a program that converts an En
    6·1 answer
  • 1. What are the first tasks the Team Leader (TL) must perform after arriving at the staging area?
    15·1 answer
  • Which of the following image file formats uses lossy file compression?
    7·1 answer
  • Write a statement to create a new Thing object snack that has the name "potato chip". Write the statement below.
    5·1 answer
  • It is also called teleconferencing or web conferencing,which is an online meeting wherein two or more people can see,hear,and ta
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!