why entity relationship model is used for data manipulation??

Answers

Answer 1

Answer:

An entity relationship diagram gives a snapshot of how these entities relate to each other. You could call it the blueprint that underpins your business architecture, offering a visual representation of the relationships between different sets of data (entities)

Hope u got it

If you have any question just ask me

If you think this is the best answer please mark me as brainliest


Related Questions

10. Why antivirus is needed to be installed in computer system?

Answers

Antivirus is the software that protects ur computer from viruses.viruses slow down ur computer it hangs ur computer so to prevent this kind of sorts we need to download antivirus

what are the steps, in order, that jonah to follow the view the “Renaissance” report?

Answers

Answer:

sy org Indonesia yaaa hallloooo

After successfully completing your computer organization and architecture class, you have a brilliant idea for a new chip design that would make a processor three times faster than the fastest ones on the market today. Unfortunately, it will take you six years to save the money, create the prototype, and build a finished product. If Moore s Law holds, you should spend your money developing and producing your chip. Group of answer choices

Answers

Answer:

I don't think that's something you can ask brainly. sounds like a project to me, I could be wrong though. good luck

When we say that communication is relational, what does that mean?
a. Communication is key to greater satisfaction in relationships.
b. Communication involves a wide range of socially appropriate behaviors.
c. Communication is something that we do to others.
d. Communication arises out of our interactions with others.

Answers

Answer:

a

Explanation:

Without communication there's nothing we can do .

Relational interaction includes the processes of interaction in personal relationships like romantic relations, family ties, and friendships, and further discussion can be defined as follows:

It consists of negotiating processes by which the dyadic partners define who they are and they will collaborate. This relation perspective assumes that the pair is indeed the best unit for interpersonal communication observation.

Therefore, the final answer is "Option a".

Learn more:

brainly.com/question/12062755

Zuzana is creating a report for her supervisor about the cost savings associated with cloud computing. Which of the following would she NOT include on her report on the cost savings?
a. Reduction in broadband costs
b. Resiliency
c. Scalability
d. Pay-per-use

Answers

In this question, the answer is  "Resiliency".

It is crucial because it gives people the strength to deal with and overcome difficulties.These people lack resilience and can readily overcome dysfunctional techniques of control. Robust people draw on their strengths and processes to solve difficulties and deal with problems.In contrast, scalability increases cost savings with alternatives such as vertical and horizontal scaling. Costs saved also include reducing the cost of broadband and pay peruse.

Therefore, the answer is "Resiliency" because it involves services which is the cost of the money.  

Learn more:

brainly.com/question/9082230

i need simple app ideas​

Answers

maybe make a game since people are playing games a lot more because of pademic.

Which of computer can be used where there is no regular electricity.​

Answers

Answer:

Non-electric computers.

Explanation:

A mechanical computer is built from mechanical components such as levers and gears, rather than electronic components.

Non-electric computers are computer can be used where there is no regular electricity.​

What are non electric computers?

This is known to be a kind of mechanical computer created mechanical components such as levers and gears instead of electronic components.

Note that  Non-electric computers are computer can be used where there is no regular electricity.​

Learn more about  computers  from

https://brainly.com/question/24540334

#SPJ9

g PRINT 'CIS2275, Lab4, question 1, twenty (20) points possible What types of stoves have sold in at least three different states and somewhere in Canada

Answers

Answer:

Explanation:

gas, electric, and induction.

write a c++ program to calculate the factorial of a number

Answers

Answer:

#include <iostream>

int factorial(int n) {

 return (n > 1) ? n*factorial(n-1) : 1;

}

int main() {

 std::cout << factorial(5);

}

Explanation:

Above is an approach using recursion.

It will output 120, which is 5! = 5*4*3*2*1

CODE

#include <iostream>

using namespace std;

int main() {

   // Declare the variables

   int n = 19;

   long int factorial = 1;

   // Each time, the factorial multiplies by integers from 1 to the maximum number.

   for(int i = 1; i <= n; i = i + 1) {

       factorial = factorial * i;

   }

   

   // Display the factorial

       cout << factorial;    

   return 0;

}

EXPLANATION

Declare n and factorial as integers and long integers.

The "for loop" runs from 1 to the maximum number and increments by 1. The factorial multiplies each time by integers from 1 to n.

Print the factorial.

Louis has entered a column of expense values. What feature can he use to insert the total expenses at the end of the column?
O a. absolute reference
O b.reference operator
O C. mode indicator
O d. AutoSum button

Answers

I think it’s B tho I’m not really sure


The action displayed in the status bar while pointing-

Answers

Answer:

c

Explanation:

A file system which used tables to store data is called ?

Answers

Answer:

The filesystem table is an array of entries that describe each filesystem implementation that is part of the system image. ... The data field contains any private data that the filesystem needs, perhaps the root of its data structures

"Flat file" is a file system that kids used to store table data.

Computer information collected where another comparable yet disaggregated informational string being saved as nothing more than a table of entries within a two-dimensional (2-D) database, is termed as a Flat file.This same majority of database systems like MS Access as well as FileMaker Pro could consume and utilize flat-file records across a broader related database system.

Learn more about flat files here:

https://brainly.com/question/21937138

Please i need help here.. am giving brainliest.

Answers

Answer and explanation:

The question is asking what kind of formatting they used in this small sample of text, which are:

First, we see that the title, "Expert Systems" has a heading font applied to it to make it larger, so we can see what the text is about.

Secondly, the phrase "human intelligence" has a line through it, which means it has been struck through.

Next, we can see there is a list of four items that explain the characteristics of expert systems.

Lastly, all of the words in the list are italicized.

Hope this helps you!

Input and formatted output: House real estate summary
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
200000
210000
the output is:
This house is $200000. The change is $-10000 since last month.
The estimated monthly mortgage is $850.00.
Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.
LAB

Answers

Answer:

current_price = int(input())

last_months_price = int(input())

change = current_price - last_months_price

mortgage = current_price * 0.051 / 12

print('This house is $', end= '')

print(current_price, end= '. ')

print('The change is $', end= '')

print(change, end= ' ')

print('since last month.')

print('The estimated monthly mortgage is $', end= '')

print(mortgage, end='0.\n')

Attackers have taken over a site commonly used by an enterprise's leadership team to order new raw materials. The site is also visited by leadership at several other enterprises, so taking this site will allow for attacks on many organizations. Which type of malicious activity is this?

Answers

A rootkit is a malware-style terminology designed to infect an attacker's target PC and allow them to install many tools that use him for persistent wireless connectivity to the system.

It is an illegal computer program to enable continuous privileged access to a computer and hide its presence actively. In today's life, it often conceals their existence and actions from uses and other functionality of the system, especially spyware - for instance, trojans, worms, viruses.

That's why the rootkit is employed since it is developed in this case to access Victin's system at an administrator level.

Learn more:

brainly.com/question/3624293

Use the values in the range B6:C6 to extend the incremented percentages to the range D6:H6

Answers

The range of cells is defined by the upper-left cell (minimum value) as well as the bottom-right cell (highest value) of an area. The references are defined by cell.

Finally, to this selection, separate cells can be appended as well as the range is called an abnormal cell range.First choose both B6, C6, and afterward drag this symbol to H6 to a + at the bottom right-hand corner.If indeed the teachers request that the 2022 number get increased as B6*B7 and (C6*C7, D6*D7,....).

Please find the attached file for the complete solution.

Learn more:

brainly.com/question/24483719

Data modeling may be the most important part of the systems development process because: Group of answer choices data are less stable than processes. data characteristics are important in the design of programs and other systems components. it is the easiest. the data in a system are generally less complex than processes and play a central role in development.

Answers

Answer:

please mark me brainlist

Explanation:

in MS Word we can merga cells true or false​

Answers

In this video I showed you all of the locations for all items in Wacky Wizards!! I hope you enjoyed and please like and subscribe. Piece out!!!

Answer:

In this video I showed you all of the locations for all items in Wacky Wizards!

write a pseudo code that will allow a user to enter a number and divide that number by eleven and take the the modules of the entered with the answer.​

Answers

Answer:

sdhuvbfuisg

Explanation:

The set of instructions that directs the computer to perform a variety of tasks is known as a

Answers

The set of instructions that give directions to the computer in order to perform the various tasks is called the computer program.

The following information related to the computer program is:

It is the collection of instructions that could be executed by a computer in order to perform a particular task.It is the list of instructions where it informs the computer regarding what to do.

Therefore we can conclude that the set of instructions that give directions to the computer in order to perform the various tasks is called the computer program.

Learn more about the program here: brainly.com/question/11023419

I don't understand how to write both. If I repeat the first code but with 3 and 6 it doesn't work.

Thank you.

Answers

It looks like you need to get both numbers from the input. Try doing something like this:

print(int(input()) + int(input()))

What is an example of an internal threat?

Answers

Answer:

Internal threats can be equally vicious and may also include blackmail or other illicit activities. Internal threats, however, are not always malicious.

PLEASE MARK ME BRAINLIEST.

Answer:

Common methods include ransomware, phishing attacks, and hacking. Internal threats originate within the organization itself and usually are carried out by a current and former employee, a contractor, a business associate, etc. Insider attacks can be malicious or inadvertent.

Explanation:

E commerce is the demand of modern society both for time and money

Answers

Answer:

Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, ...

Answer:

is the activity of electronically buying or selling of products on online services or over the internet

For those of u who watch Lucifer- S6 is coming out on Sept 10th

Answers

Ight ty for the info

explain all the characteristics of computer​

Answers

Explanation:

everything can be found in the picture

How can using stringent security measures, such as two proxy servers with firewall, prevent a Trojan virus?

A. This would make the network virtually impossible to penetrate.
B. This would make the network more of a target.
C. It would become more difficult to penetrate the network, but still possible.
D. It cannot.

Answers

Answer:  C. It would become more difficult to penetrate the network, but still possible.

Explanation: Because its possible but you will have to see how big your network is, and its difficult but it can prevent a Trojan virus, and can deal with two proxy servers with firewall.

Hope I helped :)

What are the core skills necessary for communicating diplomatically?

Answers

Answer:

Just like approaching situations with empathy is important, the ability to approach and resolve conflict is essential when relying on your diplomatic skills. Diplomatically handling conflict in the workplace can be challenging, and the way you perceive and help resolve issues can often be a big factor in the outcome.

Explanation:

Effective communication is crucial in diplomatic interactions, as it helps to foster understanding, build relationships, and resolve conflicts.

Communicating diplomatically requires a combination of interpersonal skills, emotional intelligence, and a strategic approach to interactions.

Here are some core skills that are necessary for effective diplomatic communication:

1) Cultural Awareness: Diplomats must possess a strong understanding and appreciation of different cultures, customs, and traditions. They should be sensitive to cultural nuances and avoid making assumptions or stereotypes. Being aware of cultural differences enables diplomats to adapt their communication style and approach, facilitating effective dialogue and building rapport.

2) Active Listening: Active listening involves giving one's full attention to the speaker, understanding their perspectives, and empathizing with their concerns. Diplomats need to listen attentively, not only to the words being spoken but also to the underlying meanings and emotions conveyed. This skill helps in gaining insights, identifying common ground, and responding appropriately.

3) Emotional Intelligence: Diplomatic communication often involves managing complex emotions and delicate situations. Emotional intelligence encompasses self-awareness, empathy, and the ability to regulate one's emotions. Diplomats with high emotional intelligence can navigate challenging conversations with diplomacy, remain calm under pressure, and find mutually beneficial solutions.

4) Effective Verbal and Nonverbal Communication: Diplomats should be skilled in expressing themselves clearly, concisely, and diplomatically. They need to choose their words carefully, using tact and diplomacy to convey their messages. Additionally, nonverbal cues such as body language, facial expressions, and tone of voice play a significant role in communication. Diplomats must be mindful of their nonverbal signals to ensure their intended message aligns with their words.

5) Conflict Resolution and Negotiation: Diplomatic communication often involves resolving disputes and negotiating agreements. Diplomats should possess strong conflict resolution skills, including the ability to find common ground, mediate disagreements, and facilitate compromises. They should be adept at maintaining a calm and respectful demeanor even in contentious situations, fostering an atmosphere of collaboration and cooperation.

These skills, when honed and applied effectively, enable diplomats to navigate complex international relations, build trust, and achieve mutually beneficial outcomes.

Learn more about effective diplomatic communication: click;

https://brainly.com/question/2193447

#SPJ6

30pts! PLEASE ANSWER FAST-BRAINLIEST WILL BE MARKED
the footer is a number and is used in checking to be sure the _____ has not changed​

Answers

the footer is a number and is used in checking to be sure the bottom margin of each page has not changed​

6.
is the result of the computer processing the input you provide.

Answers

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

To function, a computer system requires four main aspects of data handling: input, processing, output, and storage. The hardware responsible for these four areas operates as follows:

Input devices accept data in a form that the computer can use; they then send the data to the processing unit.

What algorithm should I use?

Answers

Answer:

YOu should use `ordinary least square regression ´

Answer:

Read the path and algorithm labels on the chart as "If <path label> then use <algorithm>." For example: If you want to perform dimension reduction then use principal component analysis. If you need a numeric prediction quickly, use decision trees or linear regression.

Other Questions
According to data, as education level increases the unemployment rate decreases. This is an example ofwhat type of correlation? If you were an older adult, what could you expect to happen to aspects of your social relations such as relationships with adult children and friendship? Which of the following is a narrative having a literal and a figurative level of meaning? Which of the following are examples of matter? Check all that apply. A. air B. light C. water D. sound E. bacteria F. copper The RideEm Bicycles factory can produce 160 bicycles in a day at a total cost of $10,600. It can produce 180 bicycles in a day at a total cost of $11,500. What are the company's daily fixed costs (in dollars) [tex]171.36 4[/tex] What does tyranny mean my friend also needs help Background Essay Questions1. Who was Constantine?2. What two decisions did Constantine make that changed European history?3. For how many years was Constantinople the imperial capital of the Byzantine world?4. What was the primary language of the Byzantine Empire?5. Why is Byzantine history compared to an accordion? What method could be used to separate the components of gasoline? What is -2/3 - (-1/2) Last summer, at Camp Mystic Lake, the ratio of the number of boycampers to the number of girls campers was 8:7. If there were a total of600 campers, how many girl campers were there? * 3. Complete the following conversions.a. 10.5 g =____kgb. 1.57 km =____mc. 3.54 ug = ____gd. 3.5 mol =__ umol e. 1.2L=____mLf. 358 cm3 =____m3g. 548.6 mL =____cm3I need the answers and how to do it too please. I really need someones help What else besides fear may have contributed to the Salem witch trials (3r - 3) (r+2)help plz how do I stop procrastination? anyone solve this maths questions from integers Can someone plz help me ? :( Closure illustrates that a characteristic of a set is notnecessarily a characteristic of all of its subsets. The realnumbers are closed with respect to multiplication, but the irrational numbers, a subset of the real numbers, are not. Give an example of a set that is not mathematical that has a particular characteristic, but which has a subset without this characteristic. how to write nine thousands in standard form