answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
2 years ago
8

When you complete a form online with your name, address, and credit card information in order to make a purchase, you are giving

the company ________ data that can populate a relational database or spreadsheet.
Computers and Technology
1 answer:
mafiozo [28]2 years ago
3 0

Answer:

Structured

Explanation:

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data user when required or needed.

A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.

Hence, when a user completes a form online by providing his or her name, address, and credit card information in order to make a purchase, he or she is giving the company structured data (pre-defined and formatted to a set structure) that can be used to make up (populate) a relational database or spreadsheet.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

You might be interested in
Charlie has a large book collection. He was keeping track of it in a spreadsheet, but it has grown big enough that he wants to c
zepelin [54]

Answer:

Check the explanation

Explanation:

Ans 1) storing the data in one single row comes with its own barriers and that is if you delete one of the record in the spreadsheet, all the equivalent records which you didn't wanted to delete would be deleted. For take for instance, if you wish to delete the record of author "James Taylor" then all the books he has written would also be deleted from the spreadsheet.

Ans 2) In 1NF, all row is expected to have only 1 tuple, but here in this spreadsheet the title field for Author "James Taylor" has 2 books, so it would be separated into single rows.

Ans 3) The table in the attached image below doesn't delete with Delete anomaly, i.e., for author "May Norton" if you delete this record, then the only book written by her would be deleted.

So, you have to convert this table into 2NF.

Make separate tables for Author and Book

Author(Author Name, Author Country)

Books(Author Name, Book title, Publisher, Publisher Location, Year, price)

This cannot be normalized any further.

3 0
2 years ago
Which of the following statements regarding critical paths is true? a. On a specific project, there can be multiple critical pat
iVinArrow [24]

Answer:

Option a

Explanation:

The Critical Path Method is the arrangement of booked exercises that decides the term of the task. These planned exercises must be performed if the venture is to be viewed as a triumph.

Therefore, options b, c, d and e can't be true because:

b. Activities in the Critical Path Method has no or zero slack.

c. The duration of the critical path in CPM determined on the basis of the latest activity and the earliest initiation.

d. The CPM method schedules the activity of the longest duration.

7 0
2 years ago
Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
lara [203]
Hello <span>Pouerietzach


Question: </span><span>Which of the following are recommended techniques for protecting computer files and data? Check all of the boxes that apply.
</span><span>
Answer: A, B, D, E, G

Hope That Helps
-Chris</span>
5 0
2 years ago
Read 2 more answers
Ishmael would like to capture a selected portion of his screen and then capture actions he preforms on that selected portion. Wh
kompoz [17]

Answer:

Use the Insert Screen .

Explanation:

Remember, on most computer keyboard you'll find a button named "Insert Screen' which functions as a screenshot too. Also, note that if Ishmael is using Windows operating system he should simply do the following;

1. open the window you want to screenshot

2. click the Screenshot button

But to select a part of the screen he would need to use Screen Clipping which would allow him select the part of the window that he wants. ( It screen will look opaque)

3. the pointer would change to a cross, then he should press and hold the left mouse button and drag to select the part of the screen that he wants to capture.

5 0
2 years ago
Ben's team is working on an English project. The members want to see everyone's progress on their part of the project. What tech
Kruka [31]
Web conferencing would allow you to communicate freely with the team but cloud computing allows you to share data between the group. The answer would be A. Cloud Computing
7 0
2 years ago
Read 2 more answers
Other questions:
  • If a car's is malfunctioning, people in the car will become ill when driving long distances, especially if the windows are close
    6·2 answers
  • If you have long column labels with columns so wide that they affect the readability of a worksheet, you should first
    7·1 answer
  • Technician A says that the octane rating of gasoline is the measure of its antiknock properties. Technician B says that normal c
    5·1 answer
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • Which advertising medium has the widest reach on a global front?
    12·1 answer
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • The major result of treating 1-butyne with 6M aqueous NaOH would be:_______.A. the production of an alkene.B. the production of
    10·1 answer
  • The process of __________ encourages members to accept responsibility for the outcomes of a group and for changing the style in
    8·1 answer
  • Which of the following provides a suite of integrated software modules for finance and accounting, human resources, manufacturin
    15·1 answer
  • #Write a function called string_finder. string_finder should #take two parameters: a target string and a search string. #The fun
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!