Answer:
Combination of one or more columns used to identify particular rows in a relation is a key
A key is a combination of one or more columns that is used to identify particular rows in a relation.
KEYS in DBMS (database management system) is an attribute or set of attributes which helps you to identify a row in a relation(table). They allow you to find the relation between two tables.
Keys help you uniquely identify a row in a table by a combination of one or more columns in that table. Key is also helpful for finding unique record or row from the table.
Database key is also helpful for finding unique record or row from the table.
Find out more on DBMS at: https://brainly.in/question/1919695
algorithm and flowchart of detect whether entered number is positive, negative or zero
1. What characteristics are common among operating systems? List types of operating systems, and
examples of each. How does the device affect the functionality of an operating system?
The fundamental software applications running upon that hardware allow unauthorized to the interface so much with the equipment because then instructions may be sent and result obtained.
Some characteristics of OS are provided below:
Developers provide technology that could be suitable, mismatched, or otherwise completely at odds with several other OS categories throughout various versions of the same similar OS.Throughout two different versions, the OS's are often 32 as well as 64-Bit.
Type of OS:
Distributed OS.Time-sharing OS.Batch OS.
Learn more about the operating system here:
https://brainly.com/question/2126669
In order to enhance the training experience and emphasize the core security goals and mission, it is recommended that the executives _______________________.
Answer:
vg
Explanation:
kiopoggttyyjjfdvhi
why is it important to give files name that are descriptive of their content
Answer:
Provide a descriptive document file name and title
A unique, descriptive file name helps individuals understand the general topic of a document. Include similar information when writing the title of the document, and apply appropriate punctuation, e.g., no underscores.
Explanation:
Please give thanks to all my answers and please mark as brilliant and please follow me
Explain different types of networking-based attacks
Answer:
Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it
Write a SELECT statement that returns three columns: VendorName from Vendors table, DefaultAccount No from Vendors table, AccountDescription from Invoice table. The result set should have one row for each vendor, with the account number and account description for that vendor’s default account number. Sort the result set by AccountDescription, then by VendorName
Answer:
SELECT VendorName, InvoiceNumber, InvoiceDate,
InvoiceTotal - PaymentTotal - CreditTotal AS Balance
FROM Vendors JOIN Invoices
ON Vendors.VendorID = Invoices.VendorID
WHERE InvoiceTotal - PaymentTotal - CreditTotal > 0
ORDER BY VendorName;
Answer:
C
Explanation:
You work at a computer repair store. A customer wants you to install a new sound card into his computer to run his home theater system. Currently, the computer uses the sound card built into the motherboard. You need to upgrade the computer with a better sound card that installs into an expansion card slot. Your task is to complete the following:
a. Install the sound card with the optical output.
b. View the Details for each card to identify the card with an optical audio connector.
c. Boot into the BIOS and disable the onboard sound card.
d. Boot into Windows and verify that the new sound card is recognized and the onboard sound card does not appear in Device Manager.
Answer:
Explanation:
The following tasks are needed to complete the installation of the sound card so that it is fully usable.
a. and b. : First, you need to slot the sound card into a pci-e slot in the motherboard and connect the optical cable to the back of the sound card. You can look at the back of the card or the box to see if it has an optical audio connector slot.
c. Next you can boot into the Bios to disable the onboard sound card. Each motherboard is different but the usual way of entering the bios is pressing F12 when turning on the PC. Then navigate to the motherboard options tab/menu and turn off the onboard sound.
d. Finally, turn on the PC, log in and at the bottom left search bar type in Device Manager. Next navigate to sound, video and game controllers and make sure the new sound card is being detected.
What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.
Answer: A
Explanation:
Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.
Answer:
Ask permission before posting private information.
Explanation:
Just the most logical answer
Create the HTML code for this
1.Font size for the text is 20px2.Background color for table dataiscyan and table headeris lightgrey.3.Text is center aligned.4.Height of the table is 200px andwidth is 500px.5.Border thickness 2px,colour black and collapsed
Answer:
index.html:
<!DOCTYPE html>
<html>
<head>
<title>Brainly</title>
<link href="style.css" rel="stylesheet" type="text/css" />
</head>
<body>
<table id="myTable">
<caption>Duty Roster for last two days</caption>
<tr><th>Day</th><th>Morning</th><th>Afternoon</th></tr>
<tr><td>Monday</td><td colspan="2">John</td></tr>
<tr><td>Tuesday</td><td rowspan="2">Tom</td><td>Peter</td></tr>
<tr><td>Wednesday</td><td>simon</td></tr>
</table>
</body>
</html>
style.css:
#myTable {
background-color: Cyan;
border-collapse: collapse;
height: 200px;
width: 500px;
font-size: 20px;
}
#myTable td,th {
border: 2px black solid;
text-align: center;
}
#myTable td:first-child, th {
background-color: lightgray;
font-weight: bold;
}
An Olympic-size swimming pool is used in the Olympic Games, where the race course is 50 meters (164.0 ft) in length. "In swimming a lap is the same as a length. By definition, a lap means a complete trip around a race track, in swimming, the pool is the race track. Therefore if you swim from one end to the other, you’ve completed the track and thus you’ve completed one lap or one length." (Source: What Is A Lap In Swimming? Lap Vs Length)
Write the function meters_to_laps() that takes a number of meters as an argument and returns the number of laps. Complete the program to output the number of laps.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
150
the output is:
3.00
Ex: If the input is:
80
the output is:
1.60
Your program must define and call the following function:
def meters_to_laps (length)
Answer:
In Python:
def meters_to_laps(length):
lap = length/50
print('{:.2f}'.format(lap))
Explanation:
This line defines the function
def meters_to_laps(length):
This calculates the number of laps
lap = length/50
This prints the calculated number of laps
print('{:.2f}'.format(lap))
To call the function from main, use:
meters_to_laps(150)
Advantages of special purpose computer
Answer:
The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..
Explanation:
Convert (24) 10 to binary
Answer:
Decimal 24 to Binary Conversion
The base-10 value of 24 10 is equal to base-2 value of 110002.
I hope it's helpful!
Answer:
The binary of 24 is 11000
In MS Excel, a function is written as =FUNCTION_NAME(_____________________).
Explanation:
A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.
Under foreign corrupt practices act, under what conditions is a bribe not unlawful explain and provide an example
Answer:
ex. telling your children if you clean up you get new toys
What happens when two users attempt to edit a shared presentation in the cloud simultaneously? The second user is unable to open the presentation. When the second user logs on, the first user is locked out. A presentation cannot be shared in the cloud for this reason. A warning notice will alert the users that the presentation is in use.
Answer:
a warning notice will alert the users that the presentation is in use
Explanation:
I did it on edge
Answer:
D; A warning notice will alert the users that the presentation is in use.
Explanation:
Edge
____________ reference is used when you want to use the same calculation across multiple rows or columns.
Answer:
relative cell
Explanation:
So, if you want to repeat the same calculation across several columns or rows, you need to use relative cell references. For example, to multiply numbers in column A by 5, you enter this formula in B2: =A2*5. When copied from row 2 to row 3, the formula will change to =A3
Answer:
Relative
Explanation:
Relative reference is used when you want to use the same calculation across multiple rows or columns.
The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the CREATE TABLE statement that inserts the following movies:
Title Rating Release Date
Raiders of the Lost Ark PG June 15, 1981
The Godfather R March 24, 1972
The Pursuit of Happyness PG-13 December 15, 2006
Note that dates above need to be converted into YYYY-MM-DD format in the INSERT statement. Run your solution and verify the movies in the result table have the auto-assigned IDs 1, 2, and 3.
CREATE TABLE Movie (
ID INT AUTO_INCREMENT,
Title VARCHAR(100),
Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')),
ReleaseDate DATE,
PRIMARY KEY (ID)
);
-- Write your INSERT statement here:
Answer:
INSERT INTO Movie(Title,Rating,ReleaseDate)
VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),
("The Godfaher",'R',DATE '1972-03-24'),
("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');
Explanation:
The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.
What are examples of object types that can be viewed in the Navigation pane? Check all that :
commands
forms
options
queries
tasks
tables
Answer:
2.) Forms
4.) Queries
6.) Tables
Explanation:
What are the inputs and outputs of the app "Spotify"?
Hey the I/O for Spotify would be. for I or input keyboard and mouse.
and for O or output the sound files being sent from the server to the pc
Hope this helps.
-Toby aka scav
Answer:
Input is for mics and other tools, output is your audio interface, speakers, headphones, so on. 3. At the top you'll find general system-wide settings, below you find dedicated settings for each open app. You'll need to have Spotify open to see it there.
Explanation:
name 20 input device
Answer:
I wish that is helpful
.........
Answer:
Some Input devices are;
KeyboardMouseLight penMicrophoneDocument scannerCharacter readerBar-Code readerTrack pointTouch padTrack ballDigital cameraMagnetic Ink Character readerMagnetic stripTouch screenwhat is the file extension if the file editing
Explanation:
"A file extension (or simply "extension") is the suffix at the end of a filename that indicates what type of file it is. For example, in the filename "myreport. txt," the . TXT is the file extension.Sometimes long file extensions are used to more clearly identify the file type."
Online, it is easy to think of communication as “computer to ____________” rather than “_________ to ___________”.
a.
person, computer, person
b.
computer, person, computer
c.
person, person, person
d.
computer, person, person
Online, it is easy to think of communication as “computer to computer” rather than “person to person”. Thus, option D is correct.
What is communication?It is possible to describe communication as the act of passing the information between one person or group of people to the next. Communicating facilitates easy understanding of what a different person is trying to say or convey. There are two forms of communication: both verbal and nonverbal.
With the help of communication the person can tell and feature tthe data between the person and an group. In this, that data is given to the people and the data is not given to the person but it is rather given to the person. As this data is been transferred from one computer to another and then it reaches the people.
Therefore, option D is the correct option.
Learn more about communication, here:
https://brainly.com/question/22558440
#SPJ2
when you value stored in a variable its previous value gets _________.
a) Accepted b) Overwritten c) Overlapped
Answer:
B
Explanation:
You wore more a thu friends
Practice Question
What will be displayed after this
code segment is run?
count
0
REPEAT UNTIL (count = 3
count count + 1
DISPLAY
and"
DISPLAY count
"1 and 2 and 3"
"And 1 and 2 and 3"
"0 and 1 and 2"
"And 0 and 1 and 2"
Answer:
Follows are the code to the given question:
#include <stdio.h>//header file
int main()//main method
{
int count=0;//defining an integer variable
for(count=0;count<3;count++)//use for loop to count values
{
printf("%d\n",count);//print count values
}
return 0;
}
Output:
0
1
2
Explanation:
In this code, it declares the integer variable "count" which has a value of "0" and in the next step declares a loop, using the count variable to regulate count values, which is less than 3, and increases the count value, and prints its values. This variable is the count value.
The count variable holds a value of 0, and use a for loop that checks its value is less than 3, and print its value, that's why it will print the value that is 0,1, and 2.
Explanation historical development of computer
Answer:
Brief History Of Computer. The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. ... Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built.
Explanation:
Computers and electronics play an enormous role in today's society, impacting everything from communication and medicine to science.
Although computers are typically viewed as a modern invention involving electronics, computing predates the use of electrical devices. The ancient abacus was perhaps the first digital computing device. Analog computing dates back several millennia as primitive computing devices were used as early as the ancient Greeks and Romans, the most known complex of which being the Antikythera mechanism. Later devices such as the castle clock (1206), slide rule (c. 1624) and Babbage's Difference Engine (1822) are other examples of early mechanical analog computers.
The introduction of electric power in the 19th century led to the rise of electrical and hybrid electro-mechanical devices to carry out both digital (Hollerith punch-card machine) and analog (Bush’s differential analyzer) calculation. Telephone switching came to be based on this technology, which led to the development of machines that we would recognize as early computers.
The presentation of the Edison Effect in 1885 provided the theoretical background for electronic devices. Originally in the form of vacuum tubes, electronic components were rapidly integrated into electric devices, revolutionizing radio and later television. It was in computers however, where the full impact of electronics was felt. Analog computers used to calculate ballistics were crucial to the outcome of World War II, and the Colossus and the ENIAC, the two earliest electronic digital computers, were developed during the war.
With the invention of solid-state electronics, the transistor and ultimately the integrated circuit, computers would become much smaller and eventually affordable for the average consumer. Today “computers” are present in nearly every aspect of everyday life, from watches to automobiles.
The history of computers is one that began far back 2000 years ago in the city of Babylonia where there was the use of abacus and it has grown to now the use of digital computer as it start in 1642.
What is the history of computer?The history of computers is one that is more than 200 years but in the 19th century, there was the invention of mechanical calculating machines.
Note that the The 1st generation of computers was said to have existed from the year 1940 to 1955 and now it has grown to a whole new level.
Learn more about computer from
https://brainly.com/question/24540334
#SPJ9
A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design
methodology would they be using?
A
structured design
B.
modular design
C.
object-oriented design
rapid application development
D
E
use-case design
Answer:
C. object-oriented design
Explanation:
Answer:
c. object- oriented design.
Explanation:
i took the test.
Which statement is true for slide or positive film?
A.
Slides or positive films give low color saturation and contrast.
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
C.
Slide or positive films cannot be used to digitize and scan pictures.
D.
Slide or positive films are useful for cheaper compact cameras.
Answer:
B.
Slides or positive films give high quality pictures with higher color saturation and contrast.
Explanation:
The above is true for slides with positive film. This is because, the positive film happens to have a high resolution when it was been used thereby giving out a high quality video at the end of the recording. The higher colour saturation and contrast are also an attribute of a slide or positive film.
Answer:
B
Explanation:
Companies sometimes pay search engine companies to have their websites located at the top of the search results. Do you think this is fair/ethical?
Answer:
I really don't think that it is fair or ethical.
Explanation:
When companies pay to put their websites at the top it is known as an ad. They are in top search engines like the ones we use every day. I believe this is unethical because it often results in confusion and sometimes misleads the user as the titles often use clickbait.
Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121
Answer:
pakistan
india
usa
china
uk
afghanistan
iran
iraq
israel
full meaning of ENDVAC
Answer:
EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.
Explanation:
Here is the full meaning