answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
atroni [7]
2 years ago
12

Naturally occurring files can share hash values

Computers and Technology
1 answer:
Tanya [424]2 years ago
7 0
Yes, they can. It's called a hash collision.
You might be interested in
HELP 30 points and Brainliest.Type the correct answer in the box. Spell all words correctly.
maria [59]

Answer:

engineering

Explanation:

8 0
2 years ago
1. In the Entity-Relationship Model, relationships can have attributes.
Vladimir [108]

Answer:

1. A. True

2. A. True

3. B. Conceptual.

4. Three (3).

Explanation:

An Entity-Relationship Model is used in databases to describe the structure and relationship between data elements known as entities.

1. True: In the Entity-Relationship Model, relationships can have attributes.

2. True: Attributes are the smallest division of data in ER diagram.

3. Conceptual: the level of abstraction which the Entity-Relationship Model most concerned with.

4. Consider the following relationship involving two entities, students and classes: A student can take many classes. A class can be taken by many students. The number of tables which can be used to represent this relationship in a schema is 3 because we are having three (3) parameters which are simply the students and the two entities.

In database management, the term "schema" is used to denote a representation of data.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

5 0
2 years ago
Joann is in the process of creating a document to introduce her company. She wants to use Quick Parts to complete
Kobotan [32]

Answer:

Insert, Text

Explanation:

7 0
2 years ago
Which software programs should students avoid using to create and submit course work? (Choose all that apply.
mel-nik [20]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

You can submit your course work most often in a Word document. Because in the word document, you can insert text, numbers, images, charts, shapes whatever you want such as required for writing a course assignment or course work- easily.  Because your final work should be in a complete document.

The correct options to this question, that you should need to avoid using to create and submit course work are pages, numbers, and keynote.

Because while submitting the course work, you need to submit a complete word document, it is not required to you that you have to submit numbers, pages, or keynotes along with the course assignment. You can create a course assignment or project document in word and submit to your respective teacher. However, you can not create your course work using keynotes or pages, etc as given in the question.

4 0
2 years ago
The data in a data warehouse have which of the following characteristics?
Burka [1]

Answer: Option(d) is correct

Explanation:

Data warehouse is the storage that holds collected information and data for making acknowledged decision through analyzing the data. Data present in data warehouse is as per subject which contains history and sources of data for understanding and perceiving it.

  • Other options are incorrect because data is not coded in various forms,retrieved for certain period of time, real-time update and arrangement in hierarchical form.
  • Thus, the correct option is option(d).
6 0
2 years ago
Other questions:
  • Which of the following word pairs correctly completes the sentence below?
    15·2 answers
  • For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distribute
    6·1 answer
  • Why can't you use Friedman's attack on block ciphers?
    12·1 answer
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • In this lab, you use the pseudocode in figure below to add code to a partially created Python program. When completed, college a
    11·1 answer
  • Using the RAID controller on the motherboard, you configure three hard disks in a RAID 5 array. You leave the array unpartitione
    14·1 answer
  • (a) Show how to use (the Boolean formula satisfiability program) satisfiable num (and substitute) to find a satisfying assignmen
    9·1 answer
  • Nathan would like to save his PowerPoint presentation as a video that can be replayed easily on any device at full quality. Whic
    14·1 answer
  • Array A is not a heap. Clearly explain why does above tree not a heap? b) Using build heap procedure discussed in the class, con
    15·1 answer
  • PLEASE HELP!!~~
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!