answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew11 [14]
1 year ago
13

When creating a table in the relational database design from an entity in the extended e-r model, the attributes of the entity b

ecome the rows of the table?
Computers and Technology
1 answer:
larisa86 [58]1 year ago
8 0
No.  The attributes of the table correspond to columns within the table.  Each unique set of attribute values taken together correspond to table rows.  Sometimes referred to as "records".

You might be interested in
The domains of the risk IT framework mutually inform each other, creating flexibility and agility. It is possible to uncover a p
Andrej [43]

Answer:

The best option is A).True

Explanation:

This is because, according to the statement, it is possible to uncover a potential threat in the risk governance domain and quickly assess its impact using the risk evaluation domain in an IT environment. The risk IT framework is used in an IT environment for security of domains, the business involved, etc.

6 0
2 years ago
Here is a series of address references given as word addresses: 2, 3, 11, 16, 21, 13, 64, 48, 19, 11, 3, 22, 4, 27, 6, and 11. A
Allisa [31]

Answer:

Explanation:

kindly check the attachment for better explanation to the answer

4 0
1 year ago
How long does it take 2 consultants to create a slide deck of 120 slides, assuming one consultant make 2 slides per hour?
Andreyy89

It would take 2 consultants 30 hours to create a slide deck of 120 slides.

Explanation:

Rate of slide making by one consultant- 2 slides per hour

Target- 120 slides

2 consultants are employed in the job-  

Since 2 consultants are employed in the job, total rate of making slides per hour would be 4 slides/hour (2*2 slides/hour)

Time required to complete 120 slides= total slides/rate of doing slides per hour

Substituting the values, we get

Time required= 120/4= 30 hours

Hence, it would take 30 hours for 2 consultants to create a slide deck of 120 slides.

7 0
2 years ago
Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than or e
stira [4]

Answer:

IF(AND(Payment_Type = 'Credit', Amount >= 4000),'Flag')

Explanation:

Given

Search criterion 1: Payment Type: Credit

Search Criterion 2: Amount ≥

$4000

Given the above search criteria, the nested function is as follows;

IF(AND(Payment_Type = 'Credit', Amount >= 4000),'Flag')

The above statement will display the word 'Flag' without the quotes if and only if the two conditions in the brackets are satisfied

Condition 1: Payment_Type = 'Credit'

Here, Payment_Type is used because when naming a column, it's preferred to avoid space or blank characters.

So, if this condition is satisfied (i.e. if payment type is credit) it checks for condition 2

Condition 2: Amount>=4000

This mean the amount must be at least 4000.

Both conditions must be satisfied because of the AND clause in the statement.

8 0
2 years ago
In today’s fast-paced, often "agile" software development, how can the secure design be implemented?
alexdok [17]

Answer:

Answered below

Explanation:

The agile approach to software development involves development through the collaborative efforts of integrated and organised teams and users. Nowadays, people follow this approach because it allows for faster deployment, continuous updates as well as flexibility in development.

In the face of this rapid development and deployment, security design can be a challenge to keep up with.

Some steps to implement security in an agile environment include;

- Approaching security implementation in the same agile way as software development.

- Making software developers responsible for secure development and implementation.

- Utilising continuous integration of security practices by integrating security solutions with the development tools.

7 0
2 years ago
Other questions:
  • What is a typical grace period for a credit card...
    15·2 answers
  • Select the correct answer. Rachel needs to make a presentation on ethics and etiquettes in college. She has about 30 minutes to
    13·1 answer
  • What is the value of x after each of the following statements is encountered in a computer program, if x=1 before the statement
    9·1 answer
  • Nicole wants to create a database to collect information about videos in her video rental store. She would like to use the datab
    9·1 answer
  • How many times does the following loop execute?int upperCaseLetters = 0;String str = "abcdEfghI";boolean found = false;for (int
    5·1 answer
  • Assume that k corresponds to register $s0, n corresponds to register $s2 and the base of the array v is in $s1. What is the MIPS
    10·1 answer
  • Assign max_sum with the greater of num_a and num_b, PLUS the greater of num_y and num_z. Use just one statement. Hint: Call find
    5·1 answer
  • A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle d
    13·1 answer
  • What does NOT match with Agile Manifesto?
    9·1 answer
  • The hostel in which you plan to spend the night tonight offers very interesting rates, as long as you do not arrive too late. Ho
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!