Answer:
When implementing a 1:1 relationship, the foreign key should be placed on the optional side if one side is mandatory and one side is optional.
When this is implemented, the foreign key should be made mandatory.
Explanation:
A foreign key (FK) is a primary key (PK) in relational databases. It is used to establish a relationship with a table that has the same attribute with another table in the database. A mandatory relationship exists when the foreign key depends on the parent (primary key) and cannot exist without the parent. A one-to-one relationship exists when one row in a data table may be linked with only one row in another data table.
What does 32mb SVGA do
Answer:
hope it helps PLZ MARK ME BRAINLIEST,,!
Explanation:
They stabilize your grpahic image.
A coin is tossed repeatedly, and a payoff of 2n dollars is made, where n is the number of the toss on which the first Head appears. So TTH pays $8, TH pays $4 and H pays $2. Write a program to simulate playing the game 10 times. Display the result of the tosses and the payoff. At the end, display the average payoff for the games played. A typical run would be:
Answer:
Explanation:
The following code is written in Java. It creates a loop within a loop that plays the game 10 times. As soon as the inner loop tosses a Heads (represented by 1) the inner loop breaks and the cost of that game is printed to the screen. A test case has been made and the output is shown in the attached image below.
import java.util.Random;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
int count = 0;
int loopCount = 0;
while (loopCount < 10) {
while (true) {
Random rand = new Random();
int coinFlip = rand.nextInt(2);
count++;
if (coinFlip == 1) {
System.out.println("Cost: $" + 2*count);
count = 0;
break;
}
loopCount++;
}
}
}
}
Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute the ASCII value of each character of the string and sum them up. You will thus need to calculate two sums, one for each string. Then, return true if the first string has a larger ASCII sum compared to the second string, otherwise return false. In your main function, prompt the user to enter two strings with a suitable message and provide the strings to the function during function call. The user may enter multiple words for either string. Then, use the Boolean data returned by the function to inform which string has the higher ASCII sum.
Answer:
The program in Python is as follows:
def ASCIIsum(str1,str2):
asciisum1 = 0; asciisum2 = 0
for chr in str1:
asciisum1 += (ord(chr) - 96)
for chr in str2:
asciisum2 += (ord(chr) - 96)
if asciisum1 > asciisum2:
return True
else:
return False
str1 = input("Enter first string: ")
str2 = input("Enter second string: ")
if ASCIIsum(str1,str2) == True:
print(str1,"has a higher ASCII value")
else:
print(str2,"has a higher ASCII value")
Explanation:
This defines the function
def ASCIIsum(str1,str2):
This initializes the ascii sum of both strings to 0
asciisum1 = 0; asciisum2 = 0
This iterates through the characters of str1 and add up the ascii values of each character
for chr in str1:
asciisum1 += (ord(chr) - 96)
This iterates through the characters of str2 and add up the ascii values of each character
for chr in str2:
asciisum2 += (ord(chr) - 96)
This returns true if the first string has a greater ascii value
if asciisum1 > asciisum2:
return True
This returns false if the second string has a greater ascii value
else:
return False
The main begins here
This gets input for first string
str1 = input("Enter first string: ")
This gets input for second string
str2 = input("Enter second string: ")
If the returned value is True
if ASCIIsum(str1,str2) == True:
Then str1 has a greater ascii value
print(str1,"has a higher ASCII value")
If otherwise
else:
Then str2 has a greater ascii value
print(str2,"has a higher ASCII value")
All of the following are technical solutions to protecting user privacy except: Group of answer choices Data use policies Anonymous email Preventing client computers from accepting cookies Email encryption Anonymous surfing
Answer:
Data use policies
Explanation:
Technically data use policies are not specifically made to protect user privacy, however it also should not violate user privacy. Data use policies are required by law. They are compulsory disclosures that list the various ways in which data in the form of personal data of individuals is collected, shared or used by digital companies(companies that operate on the internet, make use of email lists, etc ) are used.
Mối quan hệ giữa đối tượng và lớp
1. Lớp có trước, đối tượng có sau, đối tượng là thành phần của lớp
2. Lớp là tập hợp các đối tượng có cùng kiểu dữ liệu nhưng khác nhau về các phương thức
3. Đối tượng là thể hiện của lớp, một lớp có nhiều đối tượng cùng thành phần cấu trúc
4. Đối tượng đại diện cho lớp, mỗi lớp chỉ có một đối tượng
Answer:
please write in english i cannot understand
Explanation:
Fred is a 29 year old golfer, who has been playing for 4 years. He is a 12 handicap. He is considering the Srixon ZX5 or the Mavrik Pro. Talk through major considerations and provide a recommendation that would be well suited for him. Include explanations about forged vs cast features, the look of the club, and overall feel.
Answer:
oh nice yes good fine I like it
Identify and differentiate between the two (2) types of selection structures
Answer:
there are two types of selection structure which are if end and if else first the differentiation between if and end if else is if you want your program to do something if a condition is true but do nothing if that condition is false then you should use an if end structure whereas if you want your program to do something if a condition is true and do something different if it is false then you should use an if else structure
What is the Open System Foundation?
Answer:
The Open Software Foundation (OSF) was a not-for-profit industry consortium for creating an open standard for an implementation of the operating system Unix. It was formed in 1988 and merged with X/Open in 1996, to become The Open Group.
Explanation:
YOUR PROFILE PIC IS CUTE :)
A browser is a program that allow
A. users transfer messages and files through internet.
B. users search for relevant information on the WWW.
C. users to access and view web pages on the internet.
D. users exchange real-time messages or files with another online user
C. users to access and view web pages on the internet.
Given an array of n distinct integers sorted in ascending order, write a function that returns a Fixed Point in the array, if there is any Fixed Point present in array, else returns -1. Fixed Point in an array is an index i such that arr[i] is equal to i. Note that integers in array can be negative. Examples: #include using namespace std; void removeDivByFive(int *arr,int& size) { int index=0; for(int i=0;i
Answer:
The function is as follows:
int returnsFixed(int arr [],int n){
int retVal = -1;
for(int i = 0; i<n;i++){
if(i == arr[i]){
retVal = i;
break;
}
}
return retVal;
}
Explanation:
This defines the functionl it receives the array and the length of the array
int returnsFixed(int arr [],int n){
This initializes the return value to -1
int retVal = -1;
This iterates through the array
for(int i = 0; i<n;i++){
This checks if i equals arr[i]
if(i == arr[i]){
If yes, the return value (i.e. the fixed point) is set to i
retVal = i;
And the code is exited
break;
} This ends the if condition
} This ends the iteration
This returns the calculated fixed point
return retVal;
}
what is the answer to the question asked in the picture attached below
Answer:
option - b
Explanation:
i think this is the right answer..
The next few questions will be based on interpretations of a topographic map from East Brownsville, TX. To answer these questions you will have to access the topographic map of East Brownsville attached below:
What stage of fluvial landscape development is shown across the region displayed here?
a. Youthful
b. Mature
c. Old age
Answer:
a. Youthful
Explanation:
The river gets its water from youth stage fluvial water. The river meanders from side to side. East Brownsville will be less stable in international boundary in terms of physical position on the landscape because its base level drops.
1. What is memory mapped I/O?
Answer:
Memory-mapped I/O and port-mapped I/O are two complementary methods of performing input/output between the central processing unit and peripheral devices in a computer. An alternative approach is using dedicated I/O processors, commonly known as channels on mainframe computers, which execute their own instructions.
what is the characteristics of computer?dicuss any 5 of them
Answer:
speed
accuracy
diligence
versatility
reliabiility
memory
speed: a computer works with more higher speed compared to humans when performing mathematical calculations
accuracy: computer perform calculations with 100% accuracy
dilligence:a computer can perform calculations with the same consistentcy and accuracy
versatility:refers to the capability of a computer to perform different kind of works with same accuracy and efficiencies
reliability
Answer:
speed
accuracy
diligent
versatile
storage and communication
Computer data that is suitable for text
Answer:
Answer:Data Types. Computer systems work with different types of digital data. In the early days of computing, data consisted primarily of text and ...
You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file. What should you do
Answer:
Following are the solution to the given question:
Explanation:
The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.
If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel? What will be the appropriate signal level?
Answer:
caca
Explanation:
Write a recursive method to form the sum of two positive integers a and b. Test your program by calling it from a main program that reads two integers from the keyboard and users your method to complete and print their sum, along with two numbers.
Answer:
see the code snippet below writing in Kotlin Language
Explanation:
fun main(args: Array<String>) {
sumOfNumbers()
}
fun sumOfNumbers(): Int{
var firstNum:Int
var secondNum:Int
println("Enter the value of first +ve Number")
firstNum= Integer.valueOf(readLine())
println("Enter the value of second +ve Number")
secondNum= Integer.valueOf(readLine())
var sum:Int= firstNum+secondNum
println("The sum of $firstNum and $secondNum is $sum")
return sum
}
Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to operate them as separate systems
Answer:
I would prefer to use an integrated router, switch, and firewall configuration for a home network instead of operating my home devices as separate systems.
Explanation:
Operating your home devices as separate systems does not offer the required good service in information sharing. To share the internet connection among the home devices, thereby making it cheaper for family members to access the internet with one Internet Service Provider (ISP) account rather than multiple accounts, a home network is required. A home network will always require a network firewall to protect the internal/private LAN from outside attack and to prevent important data from leaking out to the outside world.
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security
Incomplete question. Here's the full question:
Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.
This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?
Explanation:
Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.
For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.
Which information can you apply to every page of your document with the page layout options?
header
conclusion
body
footer
introduction
Answer:
Header and footer
Explanation:
The page layout tab usually found in document programs such as Microsoft Word hold options used to configure several page options which is to be applied to a document. The page layout option gives users options to set page margins, orientation, page numbering, indentation and the other page layout options which is primarily how we would like our document to look like when printed. The page layout option also allows the insertion of a header and footer which is a note which can be written at the topmost and bottomost part of the document. Once, a header and footer option is selected, it is applied to every page of the document being worked on at the moment.
Write a program that uses a stack to test input strings to determine whether they are palindromes. A palindrome is a sequence of characters that reads the same as the sequence in reverse; for example, noon.
Answer:
Here the code is given as follows,
Explanation:
def isPalindrome(x):
stack = []
#for strings with even length
if len(x)%2==0:
for i in range(0,len(x)):
if i<int(len(x)/2):
stack.append(x[i])
elif stack.pop()!=x[i]:
return False
if len(stack)>0:
return false
return True
#for strings with odd length
else:
for i in range(0,len(x)):
if i==int(len(x)/2):
continue
elif i<int(len(x)/2):
stack.append(x[i])
elif stack.pop()!=x[i]:
return False
if len(stack)>0:
return false
return True
def main():
while True:
string = input("Enter a string or Return to quit: ")
if string == "":
break
elif isPalindrome(string):
print("It's a palindrome")
else:
print("It's not a palindrome")
if __name__ == '__main__':
main()
Which of the following restricts the ability for individuals to reveal information present in some part of the database?
a. Access Control
b. Inference Control
c. Flow Control
d. Encyption
Answer:
it would have to be flow control which would be C.
Explanation:
Flow Control is restricts the ability for individuals to reveal information present in some part of the database. Hence, option C is correct.
What is Flow Control?The management of data flow between computers, devices, or network nodes is known as flow control. This allows the data to be processed at an effective rate. Data overflow, which occurs when a device receives too much data before it can handle it, results in data loss or retransmission.
A design concern at the data link layer is flow control. It is a method that typically monitors the correct data flow from sender to recipient. It is very important because it allows the transmitter to convey data or information at a very quick rate, which allows the receiver to receive it and process it.
The amount of data transmitted to the receiver side without any acknowledgement is dealt with by flow control.
Thus, option C is correct.
For more information about Flow Control, click here:
https://brainly.com/question/28271160
#SPJ5
Why input screens are better data entry than entreing data dirrctly to a table
Answer:
are better data entry designs than entering data directly to a table. ... hence a user can design input fields linked to several tables/queries.
Explanation:
Input screens are better data entry designs than entering data directly to a table because a user can design input fields linked to several tables/queries.
What is digital information?Digital information generally consists of data that is created or prepared for electronic systems and devices such as computers, screens, calculators, communication devices. These information are stored by cloud.
They are converted from digital to analog and vice versa with the help of a device.
Data entered in the table directly is easier than data entry method.
Thus, input screens are better data entry than entering data directly to a table.
Learn more about digital information.
https://brainly.com/question/4507942
#SPJ2
12. How many different documents can
you have open at one time?
Answer:
10 documents ^_^
Explanation:
I can open it at the same time on my laptop ●~●
Web-Based Game that serves multiple platforms
Recommendations
Analyze the characteristics of and techniques specific to various systems architectures and make a recommendation to The Gaming Room. Specifically, address the following:
1. Operating Platform: Recommend an appropriate operating platform that will allow The Gaming Room to expand Draw It or Lose It to other computing environments.>
2. Operating Systems Architectures:
3. Storage Management:
4. Memory Management:
5. Distributed Systems and Networks:
6. Security: Security is a must-have for the client. Explain how to protect user information on and between various platforms. Consider the user protection and security capabilities of the recommended operating platform.>
Answer:
Here the answer is given as follows,
Explanation:
Operating Platform:-
In terms of platforms, there are differences between, mobile games and pc games within the way it's used, the operator, the most event play, the sport design, and even the way the sport work. we all know that each one the games on console platforms, PC and mobile, have their own characteristic which has advantages and disadvantages All platforms compete to win the rating for the sake of their platform continuity.
Operating system architectures:-
Arm: not powerful compared to x86 has many limitations maximum possibility on arm arch is mobile gaming.
X86: very powerful, huge development so easy to develop games on platforms like unity and unreal, huge hardware compatibility and support
Storage management:-
On the storage side, we've few choices where HDD is slow and too old even a replacement console using SSD. so SSD is the suggested choice. But wait SSD have also many options like SATA and nvme.
Memory management:-
As recommended windows, Each process on 32-bit Microsoft Windows has its own virtual address space that permits addressing up to 4 gigabytes of memory. Each process on 64-bit Windows features a virtual address space of 8 terabytes. All threads of a process can access its virtual address space. However, threads cannot access memory that belongs to a different process.
Distributed systems and networks:-
Network-based multi-user interaction systems like network games typically include a database shared among the players that are physically distributed and interact with each other over the network. Currently, network game developers need to implement the shared database and inter-player communications from scratch.
Security:-
As security side every game, there's an excellent risk that, within the heat of the instant, data are going to be transmitted that you simply better keep to yourself. There are many threats to your IT.
Define on the whole data protection matters when developing games software may cause significant competitive advantages. Data controllers are obliged under the GDPR to attenuate data collection and processing, using, as an example , anonymization or pseudonymization of private data where feasible.
When computer users have trouble with their machines or software, Roland is the first person they call for help. Roland helps users with their problems, or refers them to a more-experienced IT employee. Roland holds the position of __________ in the organization. Support Analyst Systems Analyst Network Administrator Database Administator
Answer:
The correct answer is A) Support Analyst
Explanation:
From the question, we can see that Roland is familiar with both machines and software. He is familiar with the operations of both parts of a computer to the end that he can attempt a fix. And if he can't he knows who to refer the end-users to. Usually, some IT personnel that is more experienced.
From the above points, we can safely say that Roland is an IT Support Analyst. He cannot be the Systems analyst because Systems Analysts are usually at the top of the Pyramid. They take on problems that are referred upwards to them from support analysts.
Cheers
9. Which of the following prefixes which relate to bytes are arranged from the smallest to the largest? a) mega, giga, tera, kilo b) meqa tera, giga, kilo c) kilo, mega, giga, tera d) kilo, giga, mega, tera
Answer:
Explanation:
C
kilo = 1000
mega = 1,000,000
giga = 1 billion = 1 000 000 000
tera = 1 trillion = 1 000 000 000 000
What variable(s) is/are used in stack to keep track the position where a new item to be inserted or an item to be deleted from the stack
Answer:
Hence the answer is top and peek.
Explanation:
In a stack, we insert and delete an item from the top of the stack. So we use variables top, peek to stay track of the position.
The insertion operation is understood as push and deletion operation is understood as entering stack.
Hence the answer is top and peek.
The importance of the 8 functions of an operating system
Answer:
Explanation:
Important functions of an operating System:
Security –
The operating system uses password protection to protect user data and similar other techniques. it also prevents unauthorized access to programs and user data.
Control over system performance –
Monitors overall system health to help improve performance. records the response time between service requests and system response to have a complete view of the system health. This can help improve performance by providing important information needed to troubleshoot problems.
Job accounting –
Operating system Keeps track of time and resources used by various tasks and users, this information can be used to track resource usage for a particular user or group of user.
Error detecting aids –
Operating system constantly monitors the system to detect errors and avoid the malfunctioning of computer system.
Coordination between other software and users –
Operating systems also coordinate and assign interpreters, compilers, assemblers and other software to the various users of the computer systems.
Memory Management –
The operating system manages the Primary Memory or Main Memory. Main memory is made up of a large array of bytes or words where each byte or word is assigned a certain address. Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, it should be first loaded in the main memory. An Operating System performs the following activities for memory management:
It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.
Processor Management –
In a multi programming environment, the OS decides the order in which processes have access to the processor, and how much processing time each process has. This function of OS is called process scheduling. An Operating System performs the following activities for processor management.
Keeps tracks of the status of processes. The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more required.
Device Management –
An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/Output controller. Decides which process gets access to a certain device and for how long. Allocates devices in an effective and efficient way. Deallocates devices when they are no longer required.
File Management –
A file system is organized into directories for efficient or easy navigation and usage. These directories may contain other directories and other files. An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more… These facilities are collectively known as the file system.