You relate tables to one another by using _______ fields.

Answers

Answer 1

Answer:

You relate tables to one another by using Matching fields

Explanation:

If there are more than one table in the database, then mostly there would be a relationship existing between the two table.

For Eg. There would be Department table where this table contains details of department number, department name and Name of the primary incharge, etc. There would be a table called “Employee” where it would contain the name of the employee along with his personal information and there would be a column where each employee would be associated with the department and would contain a field called as “department number”.

So here the database contains more than one table and these two are related using department number which is common to both the table.


Related Questions

Allie is choosing a URL for her band’s website, which is the best method of making the URL easy to understand? creating a URL with a long, descriptive domain name

creating a URL that can be rendered using file transfer protocol

creating a URL that represents data in strings of numbers


creating a human-readable URL

Answers

URL stands for Uniform Resource Locator. It identifies the location of a file on the internet and is used in order the web browser to know where to look. The entire address www.brainly.com is called the URL.
The best method of making the URL easy to understand is creating humam-readable URL.

creating a human-readable URL

How to separate a local and private variable of the same name c++?

Answers

If you have a private class variable, say private int a; and a local function variable int b; then a and b can be used in that function in the same way, you can't spot the difference. A couple of conventions exist to make this more visible in your program:

- prefix the class member variables with something like m or m_ (just an underscore is done in c# but you can run into clashes with reserved names in c++)
- always dereference them with this->a

.Exe, .msi, .msp, .inf - together, what do these filetypes indicate

Answers

.exe is a file extension for files that contains a program you can execute on a computer. You can run an executable file in Microsoft DOS or Windows using a command or double-clicking the file. 
.msi Files are database files that have pre packed dependencies, code, etc that is used by the Windows Installer to install a program package onto the host PC. MSI files install computer code, whereas EXE files can be any file that runs on a Windows computer.  
.msp Indicates a Microsoft Patch file that may be used for patching or changing a program/firmware that pre-exists on the host PC. This extension is also used for Microsoft Paint bitmap files. 
.inf is a file extension for a plain text file used by Microsoft Windows for the installation of software and drivers. It is also referred as a Setup Information file. The INF file contains various sections that specify the files to be copied, changes to the registry, etc.

Running fewer applications at once is a way to resolve which type of bottleneck?

Answers

The answer is memory.  Running fewer applications at once is a way to resolve the bottleneck in memory.  Run fewer programs at the same time and restarting a PC regularly, is a good way to clear out its memory.
Final answer:

Running fewer applications at once can resolve a computer performance bottleneck, which happens when there are too many tasks for the system's resources. This approach enhances efficiency and computer performance by reducing the load on the CPU, memory, and storage.

Explanation:

Running fewer applications at once is a way to resolve a computer performance bottleneck. A performance bottleneck occurs when the computing power is insufficient to handle all the tasks being asked of it at once. By reducing the number of applications running simultaneously, you lessen the demand on the system's resources such as the CPU, memory (RAM), and storage. This can help alleviate the slowdown and improve the overall efficiency of the computer.

For example, if a computer is running slow because too many applications are open, closing some of them might result in noticeable performance improvement. This is especially true for applications that consume a substantial amount of resources, like video editing software or games. Managing the number of active tasks is a key strategy in improving computer performance and avoiding bottlenecks.

Mime is an extension to the old rfc 822 specification of an internet mail format
a. True
b. False

Answers

The answer is True.  Mime is an extension to the old rfc 822 specification of an internet mail format . MIME is specified in detail in Internet Request for Comments 1521 and 1522, which amend the ASCII messaging header, RFC 822.

MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol.  It is extended so that Internet clients and servers could recognize and handle other kinds of data than ASCII text. New file types were added to "mail" as a supported Internet Protocol file type.

Personal computer hard disk platters typically have storage capacities ranging from 40 gb to ____.

Answers

Hard disk platters in personal computers typically range from 40 GB to several terabytes, with common consumer drives reaching up to 10 TB. The increase in storage capacities is due to advancements in data density and recording technologies. The technology evolution has seen gains from floppy disks to current solid-state drives.

Personal computer hard disk platters typically have storage capacities ranging from 40 GB to several terabytes. The storage capacity of a hard drive depends on several factors, including the physical size of the disk platters, the number of platters within the drive, and the density of the data that can be stored on them. Currently, it is common to find hard drives with a storage capacity of up to 10 TB for consumer use, which reflects significant advancements in storage technology, such as increased data density and improved recording techniques like longitudinal and perpendicular recording.

Magnetic storage media, such as hard drives, store data in the form of magnetization cell directions within a submicron-thin layer. As technology improves, the potential for higher storage capacities increases; however, the use of nanocrystals and other potential advancements for creating even denser memory disks is still a subject of research and development.

The evolution of memory storage devices has continued from large floppy disks to smaller and more efficient media like hard disk drives, and now to solid-state drives. Each technological leap has brought about increases in storage capacity, demonstrating the ongoing progress in digital storage technology.

Hard disk platters in personal computers have capacities ranging up to several terabytes, indicating a significant advancement in storage technology, especially with the increased data density of [tex]10^12[/tex] bits per square inch in modern hard drives.

Computer storage space is important to understand, as it influences how much data a device can hold. We see advancements in technology where hard drives now can store immense quantities of information. For instance, improved hard disk technology has enabled the development of hard drives with a recorded data density of the order of [tex]10^12[/tex] bits per square inch, leading to much greater storage capacities. A modern 2.5" hard drive may store up to 1 TB and even more. This is a significant leap from earlier days, indicating how storage technology is advancing.

Magnetic memories, utilizing longitudinal and perpendicular recording methods, have enabled huge increases in storage density. However, despite their massive capacities, hard disks are now being challenged by solid-state drives (SSDs), which provide faster and more reliable storage options. The continuous innovation in storage devices shows a trend where older storage mediums become obsolete while new technologies provide increased storage capacities and performance benefits.

Which type of password would be considered secure?

Answers

A strong password obeys some password rules, such as:
- minimum length
- using characters from different classes (uppercase, lowercase, numbers, typographic characters)

Your safest bet these days is to use a password manager and have it generate one for you, so that hackers can not guess it by understanding humans' predictable mind. ;-)

The process of data gathering is generally referred to as:

Answers

he answer is analytics.  The process of data gathering is generally referred to as analytics.   

Linux is _software which means users can manipulate the source code to customize their operating system to there needa

Answers

Linux is a Open-Source Kernel which means it can be edited freely.

Every information systems (is) user has the right to a secure computing environment. this means that the

Answers

Every information systems (IS) user has the right to a secure computing environment. this means that the organization should protect his/her computer and its files.

Bittorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.

Answers

Final answer:

BitTorrent functions on a peer-to-peer (P2P) network structure, enabling devices to share files directly without a central server. This decentralized approach is effective for distributing large files, making BitTorrent and related Torrent sites popular for sharing diverse types of data.

Explanation:

BitTorrent utilizes no central server, instead opting to utilize a peer-to-peer (P2P) structure where each device connected to a network has equal access to the shared files. In a P2P network, each participant, or "peer," acts both as a client and a server, sharing portions of the file directly with other peers. This decentralized model can handle large amounts of data efficiently, making it a popular method for distributing files online, including books, music, films, and scientific data sets.

One of the key advantages of the BitTorrent protocol is its ability to distribute large files effectively without the need for a powerful central server. As more users download and share a file, the distribution network becomes faster and more resilient. This efficiency is what has made BitTorrent and associated Torrent sites a preferred choice for sharing large volumes of data across the internet.

Are the best place to locate current findings on the newest technologies

Answers

Journals are the best place to locate current findings on the newest technologies.  It deals with a particular subject or professional activity, in this case, it deals with the latest findings on the newest technologies.

What is a good first step in diagnosing system throughput issues?

Answers

The answer is to determine if all devices are experiencing the problem or only a single device.  This is the good first step in diagnosing system throughput issues., to check if the problem exists with all the devices or only to a single device.

Mike can’t find a manual for the HP printer at work. What keywords should he enter in a search engine to find a manual online, and why?

Answers

he should type his devices name the model number and then go on the official site

The term database describes a collection of data organized in a manner that allows ____ of that data.

Answers

Database being the data collection is organized in away to allow the access retrieval of the data.

If a linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?

Answers

the installation would have crashed or failed

The type of error has occurred is segmentation fault.

What is segmentation fault?

Simply put, segmentation faults are mistakes brought on by a process trying to access memory locations that it shouldn't. The kernel terminates the process by sending a segmentation violation signal when it notices strange memory access activities (SIGSEGV).

The programme accessed a memory region that was not intended for it when it encountered a signal 11 error, sometimes known as a segmentation fault.

A software package that is installed may have a defect that causes a signal 11 error, or malfunctioning hardware may also be to blame.

A hardware issue in memory on your system's bus is probably to blame if you have a fatal signal 11 error during installation. Red Hat Enterprise Linux, like other operating systems, has requirements for the hardware in your system.

Even if they function perfectly under another OS, some of this hardware might not be able to handle those demands.

Learn more about segmentation fault here:

https://brainly.com/question/28483989

#SPJ5

A major weakness of a lot of file processing systems is that ____.

Answers

They are several weaknesses or disadvantages of file processing systems but the major weakness is data redundancy and inconsistency. By data redundancy, I mean duplication of data. There are no better methods to validate insertion of duplicate data in file systems. Data redundancy can also increase the chance for errors.






Final answer:

A major weakness of many file processing systems, such as those in Microsoft Windows, is their lack of backward compatibility, forcing users to upgrade in order to access files from newer versions.

Explanation:

A major weakness of a lot of file processing systems is that they lack backward compatibility. In this context, 'backward compatibility' refers to the ability of a system to use files from older versions of the software. Unfortunately, when dealing with systems like Microsoft Windows software programs, they are typically upwardly compatible only. This means new versions can read and process files created with older versions, but the reverse is not true - older systems cannot read files created by newer releases. Such a scenario causes a significant inconvenience when users of older versions receive files from those with newer software, often requiring an immediate upgrade to access those files.

Sometimes the challenges with file processing systems are also related to poor initial design, making it difficult to analyze, parameterize, or communicate changes effectively. In addition, these systems may have limitations imposed by existing software and hardware requirements, leading to unavoidable obsolescence over time.

The ________ button on the design tab displays the locations where a title and a legend can be positioned in a chart.

Answers

The quick layout button on the design tab displays the locations where a tittle and a legend can be positioned in a chart.

Which company used a virtual version of their product in the virtual world Second Life to create awareness among users about their brand?
Cadbury
iPhone
McDonald’s
Toyota

Answers

Toyota did that awarness amoung users!!

What 3 types of technologies are used inside hard drives?

Answers

Hard drives use magnetic recording for data storage, giant magnetoresistance for data readout, and nanotechnology for creating smaller magnetic grains to increase storage density.

The three types of technologies used inside hard drives are magnetic recording, giant magnetoresistance for readout, and the use of nanotechnology for increased storage density.

Magnetic Recording

The most ubiquitous technology in hard drives is magnetic recording, where data bits are stored in the form of the direction of the remanent magnetization of small film spots on a spinning disk. This has allowed for data densities of up to 1012 bits per square inch.

Giant Magnetoresistance (GMR)

For reading data, hard drives have evolved from using simple magnetic induction to harnessing giant magnetoresistance (GMR). GMR is an effect where there's a significant change in electrical resistance in the presence of a magnetic field, allowing for more efficient data readout.

Use of Nanotechnology

The third technology is the use of nanotechnology, which involves synthetic methods for creating small rod-shaped magnetic grains. With dimensions in the nanometer range, this technology can potentially enable even higher data storage densities on hard drives.

Quote one of morrie's aphorisms and explain what you think it means (page 18).

Answers

Final answer:

Morrie's aphorism "What you do not want done to yourself, do not do to others" emphasizes the importance of treating others with kindness and consideration.

Explanation:

One of Morrie's aphorisms is "What you do not want done to yourself, do not do to others." This means that we should treat others with the same kindness and consideration that we would like to be treated with. It emphasizes the importance of empathy and understanding in our interactions with others.

When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again?

Answers

The answer is TRUE

With today’s compilers, as compared to the past , you can write a program, compile it, and test it yourself. Basically, a compiler will report problems it finds in your code. Upon seeing the errors generated, you can correct it and recompile it until you get everything right.



What device connects a lan's switch to the next network? qizzlets?

Answers

I think you can call it to a Network Switch, but LAN is always used device network: Hubs and Switch or maybe Connect Device or Cable.

Which method tries all possible passwords until a match is found?

Answers

Brute force is this approach to password cracking. It tires all possible password combinations until a correct match between the hashes is found. It may make use of rainbow tables which contain precomputed password-hash combinations.

Please remember that it helps to provide the choices that match your question. This can help you get an accurate answer and have your question answered much quicker.

Final answer:

Brute force method tries all possible passwords until a match is found. Using strong and unique passwords and two-factor authentication enhances security.

Explanation:

Brute force is the method that tries all possible passwords until a match is found. This technique involves attempting every possible combination of letters, numbers, and symbols.

For better security, users should follow best practices for passwords such as using long, uncommon passwords that are not reused to prevent brute-force and dictionary attacks.

Implementing two-factor authentication can also enhance security by requiring an additional verification step beyond just entering a password.

which of the following is the process by which graphical content is created using the proper software ?

a. 3-D printing
b. tracking
c. 3-D visualization
d. kerning

i know that the answer is c , but i don't understand how .

Answers

See it's option C because 3-D visualising means creating graphical content in computers now if we are creating it in computer means we are working with software so option C is correct there.

What is an advantage of using a meta-search engine?
A.Searches can use complex search "language"
B.Searches return a high rate of relative results
C.Searches use several search engines at once
D.Searches are comprehensive

Answers

C. searches use several search engines at once

The advantage of using a meta-search engine is that its searches, use several search engines at once.

What is the advantage of Meta search?

The use of metasearch engine is one that is known to have some advantage over the only use of search engine. This is known to be good  because a lot of results can be gotten back in similar proportion of exertion and it lowers the work input of users.

Conclusively, The advantage of using a meta-search engine is that its searches, uses several search engines at once and one get result quickly.

Learn more about search engines from

https://brainly.com/question/984614

#SPJ5

Which programming language was released first?
A) FORTRAN
B) BASIC
C) Perl
D) Pascal

Answers

FORTRAN is the answer.

FORTRAN is the  programming language was released first. Hence, option A is correct.

What is FORTRAN?

Fortran is a natively parallel programming language that transmits data across CPUs and has an intuitive array-like syntax. The same code can be run on a single CPU, a shared-memory multicore system, a distributed-memory HPC system, or a cloud-based system.

More than 50 years after its debut, Fortran, the original high-level computer language, is still in use. It is employed in the simulation of atomic structures, nanoparticles, genomes, and DNA, as well as in the study of the atmosphere and the ocean.

Fortran is a language created especially for high-performance computing. In actuality, it is still evolving and alive. Fortran is still used in high-performance computing.

Thus, option A is correct.

For more information about FORTRAN, click here:

https://brainly.com/question/17639659

#SPJ6

Which of the following is true about hypertext?

a. It eliminates the need for the user to type in the
web address.
b. Clicking on it will jump the user to a related page
on the web.
c. It has given rise to the term "surfing the net."
d. It makes the Internet more "user-friendly."
e. all of the above

Answers

The answer would be E. All of the above

It is possible to play older console games such as those written for the nintendo game boy or sega genesis on a personal computer through the use of _____ programs.

Answers

emulator««««that is the answer

What are the valid indexes for the string ‘new york'?

Answers

Most programming languages index strings in a zero-based way. This means the 'n' has index 0, and the 'k', has index 7.

So valid indexes are from 0 to (and including) 7.

VBScript would refer to the 'n' as index 1, so always check if your environment is 0-based or 1-based.
Other Questions
How should literature be judged? . Stephen deposited $1800 into a savings account for which interest is compounded weekly at a rate of 3.2%. How much interest will he earn after 10 years? 58.81 678.59 2478.59 im just putting this up to see if my answer was write. i did the math and unless i messed up writing i got the second answer He peppered moth provides a well-known example of natural selection. the light-colored form of the moth was predominant in england before the industrial revolution. in the mid-nineteenth century, a dark-colored form appeared. the difference is produced by a dominant allele of one gene. by about 1900, approximately 90% of the moths around industrial areas were dark colored, whereas light-colored moths were still abundant elsewhere. apparently, birds could readily find the light moths against the soot-darkened backgroun Briefly summarize the events described in book 22. Death in the great hall. A person who is using maximum weight to push or lift in one effort is developing ____. Altering the shape of the lens to enable light to focus on the retina is called: Find the midpoint of the segment with the given endpoints. P(2, 1) and Q(3, 2) Which structure is an example of a hinge joint? Marcus baked a loaf of banana bread for a party. He cut the loaf into equal size pieces. At the end of the party, there 6 pieces left. Explain how you can find the number of pieces in the whole loaf if Marcus told you that 1/3 of the loaf was left. Need help with 2 3 4 5 6 The __________ of the brain is the location of our conscious mind.a. diencephalonb. cerebral cortexc. cerebellumd. brain stem Factor completely 56a2b3 35ab. 7ab(8ab2 5) 7a(8b2 5ab) Prime 7a(8ab3 5b) You are so absorbed watching the movie casablanca with friends that when two people ask if you want a snack, you do not even hear them. when reminded of this later, you realize that you were aware of the movie to the exclusion of everything else. this could be termed a mild: On a map, 0.25 inches represents 1 mile. What is the area of a rectangle on the map that is 3.75 inches long and 2.25 inches wide? What does madame loisel learn about the borrowed necklace at the end of the story? What is the function of Ivan's monologue in between the first two sections of the play? A. To inform the audience that Natalya isn't thinking about marriage, but only her family's land B. To show that he stubbornly plans to defend himself and his family when Natalya challenges him C. To show off his affectionate relationship with Stepan and how quickly that relationship changes D. To inform the audience of his motivations for proposing and to set up the coming action Evaluate square root of 24 - x when x = 6 . Write the answer in simplified radical form.? all I drink 3/4 of a 16 fluid ounce bottle of juice how many fluid ounces of juice are left in the bottle URGENT PLEASE HELPSuppose 20% of all widgets produced at a factory are defective.A simulation is used to model widgets randomly selected and then recorded as defective or working.Which simulation best models the scenario?Place 50 equally sized pieces of paper in a hat. Of the 50, 5 read defective and the rest read working.Place 25 equally sized pieces of paper in a hat. Of the 25, 5 read defective and the rest read working.Place 20 equally sized pieces of paper in a hat. Of the 20, 5 read defective and the rest read working.Place 100 equally sized pieces of paper in a hat. Of the 100, 5 read defective and the rest read working. What does gatsby offer nick in return for nick's cooperation in inviting daisy to his house? how does nick react and why?