Which statement is correct?
Flat files use foreign keys to uniquely identify tables.

Flat files use foreign keys to secure data.

A foreign key is a primary key in another table.

A foreign key uniquely identifies a record in a table.

Answers

Answer 1

Answer:

A foreign key is a primary key in another table.

Explanation:


Related Questions

8.9 Lesson Practice edhesive

Answers

Answer:

1. search

2. False

3. Our algorithm did not find the element we were looking for.

Explanation:

why do we need to settle technology in business?​

Answers

Answer:

Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.

Consider a model of a drone to deliver the orders of the customers within the range of 20 km of the coverage area.

Identified at least 5 factors (inputs) required to experiment with the above mention system model (e.g. speed of the drone).


Write down the levels (range or setting) for each factor mentioned above. (e.g. speed ranges from 10km/h to 30km/h).


On what responses (results) will you analyses the experiment’s success or failure (e.g. drone failed to deliver the package on time), mention at least 3 responses

Answers

Answer:

Explanation:

suna shahani kesa a ..

8. It is used to get qualitative data.​

Answers

Answer:

please give me brainlist and follow

Explanation:

Qualitative data describes qualities or characteristics. It is collected using questionnaires, interviews, or observation, and frequently appears in narrative form. For example, it could be notes taken during a focus group on the quality of the food at Cafe Mac, or responses from an open-ended questionnaire.

Discusstheimportanceofbackingupdatainorganizations,pointingoutthebenefits
ofcloudbackupoption​

Answers

Addition helps kids master the relationships between numbers and understand how quantities relate to one another. Even when kindergartners can't reliably answer addition problems or manipulate large numbers, basic addition skills give them a framework for mastering math in elementary schoo

For this lab you will write a class to create a user-defined type called Shapes to represent different shapes, their perimeters and their areas. The class should have three fields: shape, which is of type string, and perimeter and area of type double. The program will have to be able to calculate perimeters and areas for circles, triangles, squares and rectangles, which are the known shapes.
2.1 Constructors
Write these constructors:
1. Default constructor that sets the shape to "unknown" and the perimeter and area to 0
2. Constructor with one parameter, shape, that sets the shape, other fields are 0
2.2 Accessors & Mutators
Write the following member methods:
1. setShape()
Modifies the shape field
2. getShape()
Returns the shape field
3. getPerimeter()
Returns the perimeter field
4. getArea()
Returns the area field
Arithmetic Methods in Interface
Write the following member methods to perform arithmetic:
1. setPerimeter(Scanner scnr)
Depending on the shape, prompts the user for appropriate variables (ie width & height for a square, radius for a circle, etc.) and calculates the perimeter of the appropriate shape. The perimeter field should be updates with the new value. If the shape is unknown, then print to the screen that the user must first define a shape before a perimeter can be calculated and set the perimeter to 0.
2. setArea(Scanner scnr)
Depending on the shape, prompts the user for appropriate variables (ie width & height for a square, radius for a circle, etc.) and calculates the area of the appropriate shape. The area field should be updates with the new value. If the shape is unknown, then print to the screen that the user must first define a shape before an area can be calculated and set the area to 0.
2.3 Additional Methods
Create two additional methods of your choice. Be sure to clearly label both of these methods as your own.
2.4 Using another .java file called ShapesTest.java that tests that all of your methods work correctly

Answers

Answer:

========= Shape.java  ===========

//import the Scanner class

import java.util.Scanner;

public class Shape{

   //required fields

  private String shape;

   private double area;

   private double perimeter;

   //default constructor

  public Shape(){

       this.shape = "unknown";

       this.area = 0.0;

       this.perimeter = 0.0;

   }

   //constructor with one parameter

   public Shape(String shape){

       this.setShape(shape);

       this.area = 0.0;

       this.perimeter = 0.0;

   }

   //accessors and mutators

  public void setShape(String shape){

       this.shape = shape;

   }

  public String getShape(){

       return this.shape;

   }

   public double getPerimeter(){

       return this.perimeter;

   }

  public double getArea(){

       return this.area;

   }

  public void setPerimeter(Scanner scr){

       if(this.getShape().equals("circle")){

           System.out.println("Enter the radius of the circle");

           double radius = scr.nextDouble();

           this.perimeter = 2 * 3.142 * radius;

       }

       else if(this.getShape().equals("rectangle")){

           System.out.println("Enter the width");

           double width = scr.nextDouble();

           System.out.println("Enter the height");

           double height = scr.nextDouble();

           this.perimeter = 2 * (width + height);

       }

       else if(this.getShape().equals("square")){

           System.out.println("Enter the height or width");

           double height = scr.nextDouble();

           this.perimeter = 4 * height;

       }

       else if(this.getShape().equals("unknown")){

           System.out.println("You must define a shape first before calculating perimeter");

           this.perimeter = 0.0;

       }

       else {

           System.out.println("You must define a shape first before calculating perimeter");

           this.perimeter = 0.0;

       }

   }

   public void setArea(Scanner scr){

       if(this.getShape().equals("circle")){

           System.out.println("Enter the radius of the circle");

           double radius = scr.nextDouble();

           this.area = 3.142 * radius * radius;

       }

       else if(this.getShape().equals("rectangle")){

           System.out.println("Enter the width");

           double width = scr.nextDouble();

           System.out.println("Enter the height");

           double height = scr.nextDouble();

           this.area = width * height;

       }

       else if(this.getShape().equals("square")){

           System.out.println("Enter the height or width");

           double height = scr.nextDouble();

           this.area = height * height;

       }

       else if(this.getShape().equals("unknown")){

           System.out.println("You must define a shape first before calculating area");

           this.area = 0.0;

       }

       else {

           System.out.println("You must define a shape first before calculating area");

           this.area = 0.0;

       }

   }

   //Own methods

   //1. Method to show the properties of a shape

   public void showProperties(){

       System.out.println();

       System.out.println("The properties of the shape are");

       System.out.println("Shape : " + this.getShape());

       System.out.println("Perimeter : " + this.getPerimeter());

       System.out.println("Area : " + this.getArea());

   

   }

   //2. Method to find and show the difference between the area and perimeter of a shape

   public void getDifference(){

       double diff = this.getArea() - this.getPerimeter();

       System.out.println();

       System.out.println("The difference is " + diff);

   }

}

========= ShapeTest.java  ===========

import java.util.Scanner;

public class ShapeTest {

   public static void main(String [] args){

       Scanner scanner = new Scanner(System.in);

       // create an unknown shape

       Shape shape_unknown = new Shape();

       //get the shape

       System.out.println("The shape is " + shape_unknown.getShape());

       //set the area

       shape_unknown.setArea(scanner);

       //get the area

       System.out.println("The area is " + shape_unknown.getArea());

       //set the perimeter

       shape_unknown.setPerimeter(scanner);

       //get the perimeter

       System.out.println("The perimeter is " + shape_unknown.getPerimeter());

       // create another shape - circle

       Shape shape_circle = new Shape("circle");

       //set the area

       shape_circle.setArea(scanner);

       //get the area

       System.out.println("The area is " + shape_circle.getArea());

       //set the perimeter

       shape_circle.setPerimeter(scanner);

       //get the area

       System.out.println("The perimeter is " + shape_circle.getArea());

       //get the properties

       shape_circle.showProperties();

       //get the difference between area and perimeter

       shape_circle.getDifference();

   }

}

Sample output:

The shape is unknown

You must define a shape first before calculating area

The area is 0.0

You must define a shape first before calculating perimeter

The perimeter is 0.0

Enter the radius of the circle

>> 12

The area is 452.448

Enter the radius of the circle

>> 12

The perimeter is 452.448

The properties of the shape are

Shape : circle

Perimeter : 75.408

Area : 452.448

The difference is 377.03999999999996

Explanation:

The code above is written in Java. It contains comments explaining important parts of the code. Please go through the code for more explanations. For better formatting, the sample output together with the code files have also been attached to this response.

Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
Group of answer choices

self-modeling

gigabit ethernet

political awareness

social distancing

binary verificationism

Answers

Answer:

self-modeling

Explanation:

Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.

For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.

what is the determinant of the identity matrix I?​

Answers

Answer:

Explanation:

The ith column of an identity matrix is the unit vector ei (the vector whose ith entry is 1 and 0 elsewhere) It follows that the determinant of the identity matrix is 1, and the trace is n. When the identity matrix is the product of two square matrices, the two matrices are said to be the inverse of each other.

What is the first thing you should do when you discover a computer is infected with malware? The second thing?

Answers

Answer:

Quarantine the computer.

Explanation:

Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.

In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.

Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.

Explain what an IM is, and what is the technology shown in the accompanying figure

Answers

Answer: Instant Message

Explanation:

Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz

Explanation:

Three reasons why users attach speakers to their computers.

Answers

Answer:

Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.

Explanation: I hope this helps!

web analytics can tell you many things about your online performance, but what can analytics tools not tell you​

Answers

Answer:

The answer is below

Explanation:

While web analytics such as Góogle analysts is known to help online marketers to map out a clear strategy and thereby improve their outreach, there are still some specific things the current web analytics can not do for the user. For example:

1. Web Analytics can’t accurately track leads

2. Web Analytics can’t track lead quality

3. Web Analytics can’t track the full customer journey

4. Web Analytics can’t highlight the true impact of payment.

How can the adoption of a data platform simplify data governance for an organization?

Answers

Answer:

by implementing models that predict compliance with data protection and data privacy policies.

Explanation:

A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .

A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.


State
any three (3) reasons why users attach speakers to their computer?

Answers

Answer:

To complete the computer setup, to hear audio, to share audio.

Explanation:

A computer is not really complete without speakers.

So that you can actually hear the computer's audio.

So that you can have multiple people hear the same audio. (Headphones do not do this)

what is the relationship between a base and the number of symbols in a positional number system​?

Answers

Answer:

the value of a symbol is given by the weight of it's position expressed in the bases of the system (or radices)

The XYZ daycare has installed a new high-tech system for keeping track of which children are under its supervision at any moment in time. Each parent of a child has a card with a unique ID, where the ID is some integer x. Every morning, the parent swipes the card at a card-reader when dropping their child off at the daycare. The system then adds x to an array of integers. In the evening, when the parent comes to pick up the child, the same card is swiped, and a second copy of x is added to the list. Each night at midnight, the array is wiped clean and reset to have zero elements. In this way, the daycare can quickly check every afternoon which children are yet to be picked up by their parents by picking out the array elements that occur precisely once. Unfortunately, at 4:55 pm on Thursday, April 20, 2017, the daycare realizes that somewhere in their daycare is precisely one child who is yet to be picked up. Can you help them determine the integer ID of this child

Answers

Answer:

Use or Add a log of the actions of the system including the integer, the action,  and the time. Scroll through and see which integer was added but was not removed.

Explanation:

I wouldn't be able to program this, but I think a log is the best solution for this.

list out and discuss the characteristics of big data​

Answers

Answer:

Volume: Volume refers to the sheer size of the ever-exploding data of the computing world. It raises the question about the quantity of data.

Velocity: Velocity refers to the processing speed. It raises the question of at what speed the data is processed.

Variety: Variety refers to the types of data.

Explanation:

For two integers m and n, their GCD(Greatest Common Divisor) can be computed by a recursive function. Write a recursive method gcd(m,n) to find their Greatest Common Divisor. Once m is 0, the function returns n. Once n is 0, the function returns m. If neither is 0, the function can recursively calculate the Greatest Common Divisor with two smaller parameters: One is n, the second one is m mod n. Although there are other approaches to calculate Greatest Common Divisor, your program should follow the instructions of this question, otherwise you will not get the credit. Then write a testing program to call the recursive method.

Answers

Answer:

In Python:

def gcd(m,n):

if n == 0:

 return m

elif m == 0:

    return n

else:

 return gcd(n,m%n)

Explanation:

This defines the function

def gcd(m,n):

If n is 0, return m

if n == 0:

 return m

If m is 0, return n

elif m == 0:

    return n

If otherwise, calculate the gcd recursively

else:

 return gcd(n,m%n)

To call the function to calculate the gcd of say 15 and 5 from main, use:

gcd(15,5)

What are some examples and non-examples of digital etiquette?

Answers

Answer:

saying hello to strangers and standing up to cyber bullies

using all caps. cyber bullying. cursing. stalking

dont download that file

IPSec or internet Protocol Security is an extension of the Internet Protocol. What does IPSec use to provide network security?

Answers

Answer:

In computing, Internet Protocol Security ( IPSec ) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over on internet protocol network. It is used in virtual private networks ( VPNs ).

1. Programmable logic controllers (also called
PLCs) are used to control machines and other
industrial applications with
instead
of using hard-wired devices.

Answers

Answer:

A programmable logic controller (PLC) or programmable controller is an industrial digital computer that has been ruggedized and adapted for the control of manufacturing processes, such as assembly lines, robotic devices, or any activity that requires high reliability, ease of programming, and process fault diagnosis.

Explanation:

unanswered questionl

Answers

¿ ? ¿ ? Whattttt ? ¿ ? ¿

Answer: What

Explanation:

Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO THE RIGHT ANSWER

aspect-oriented
data-oriented
fourth-generation
logic-based

Answers

Answer:

I think it is fourth-generation.

Explanation:

Question 4
What methods do phishing and spoofing scammers use? List and explain methods to protect
against phishing and spoofing scams. (10 marks​

Answers

Answer:

The answer is below

Explanation:

There are various methods of phishing and spoofing scammers use, some of which are:

Phishing:

1. Descriptive phishing: here the scammer use fake email to pretend to be a genuine company and steal people's vital details

2. Spear Phishing: here the scammer creates an email that appears there is a connection on the potential victim

3. CEO Fraud: here the scammer target CEO of a company, thereby if successful can fraudulently attack the company due to his access.

Other phishing attacks are vishing, smishing, and pharming, etc.

Spoofing:

1. Email spoofing: here the attacker sends an email through a fake email address to get personal details of a potential victim

2. Caller ID Spoofing: here the attacker makes it appear that he is one specific person, but he is not in the real sense.

3. GPS Spoofing: here the attacker makes it appear he is in a specific location, whereas, he is not.

Others include website spoofing, text message spoofing, Io spoofing etc.

In which category would Jamal most likely find an appropriate template for his report?

Designs
Diagrams
Education
Personal

Answers

Answer:

Education

Explanation:

help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..​

Answers

Answer:

if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus

Explanation:

what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term

Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and malware detection software

Answers

Answer:There are several software products and settings you can make that will help alert you to or protect you from certain kinds of technology attacks such as malware, viruses, and so on.   Use these programs and keep them up to date so they can defend you against the latest threats.

Explanation:

Ling has configured a delegate for her calendar and would like to ensure that the delegate is aware of their permissions. Which option should she configure?

Delegate can see my private Items
Tasks > Editor
Inbox > None
Automatically send a message to delegate summarizing these permissions

Answers

Answer:

Tasks>Editor (B)

Explanation:

I just did the test

Answer:

Tasks > Editor

Explanation:

Did the test

Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.

Answers

Solution :

class Account

[tex]$ \{ $[/tex]

public:

[tex]$\text{Account}()$[/tex];

double [tex]$\text{getBalance}$[/tex]();

void [tex]$\text{setBalance}$[/tex]();

[tex]$\text{bool withdraw}$[/tex](double bal);

[tex]$\text{private}:$[/tex]

double [tex]$\text{balance}$[/tex];

}:

[tex]$\text{Account}()$[/tex] {}

double [tex]$\text{getBalance}$[/tex]()

[tex]$ \{ $[/tex]

[tex]$\text{return balance}$[/tex];

}

void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])

[tex]$ \{ $[/tex]

this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];

}

[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])

[tex]$ \{ $[/tex]

if([tex]$\text{balance}$[/tex] >= bal)

[tex]$ \{ $[/tex]

[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;

[tex]$\text{return}$[/tex] true;

}

[tex]$\text{return}$[/tex] false;

}

}

does anyone play r0bIox

Answers

Answer:

Ah, okay okay, I know that game seems like a MEME, but it's actually good. I know a lot of kids play it and this community is filled with people...

Other Questions
Answer as many as you can you don't need to do all though from the movie My All American:1. Describe Freddies self-esteem from the time he was little kid and any changes that may have occurred as his life continued.2. What was Freddies best quality? Why?3. If you were Freddie, how does the story go?4. Is self-esteem/ self-worth important in our daily life? Why?5. Is life arbitrary? How have you heard others respond to the question about bad things happening to good people? Have they helped you make sense of the world or made it more difficult to understand?I would appreciate if you did all though lol What are the coordinates of the point (-1, 5) when it is reflected across the y-axis? * if a bond with a $1,000 par value, 20 years to maturity, and a coupon interest rate of 10% was selling for $1100, then the yield to maturity on that bond is: A. is less than 10% B. is greater than 10% C. is 10% D. cannot be determined g Question 18 (5 points)If two lines are perpendicular to the same line, then they areto each other.A) congruentB) perpendicularC) parallelD) complementary True or false when competition encourages people to try new approaches and allows anyone with a good idea a chance to succeed, which does not help to contribute to a democratic society What happened to the economic importance of oil in Louisiana in the 1980s?It declined in importance due to competition from cheap foreign oil.It declined in importance because American forces captured Iraqi oil fields.It increased in importance because many of the Alaska oil wells dried up.It increased in importance due to higher demand from the Army. HURRY PLEASE Which of the following BEST describes the Cold War policy of containment?creating alliances to block the spread of Soviet communismBusing economic incentives to encourage the Soviets to abandon communismCusing diplomacy and other peaceful means to improve US-Soviet relationsDracing the Soviets to build as many nuclear weapons as possible Given that ac=22 and bc=7, find ab Solve for the number problem 11 Which of the following budget is suitable for developing nations -(a) Deficit Budget(b)Balanced Budget(c)Surplus Budget(d)None of the above What is C= 5/9 F32)Btw / (like in 5/9) is a way I use fractions c: When the quantity of coal supplied is measured in kilograms instead of pounds, the demand for coal becomes Cul no corresponde sobre el lenguaje articulado? *una conferenciauna charlauna reuninun dilogoun papel A: shape B: Line C: space D: Depth The headline below describes an event that took place in 1955.What is the primary purpose of this event?To create a military allianceRemove regional trade barriersEncourage a democratic electionPreserve a regional cultural identities HELP!!! ANYONE!! ASAP!!! Jennifer and Jamie have a class assignment to identify an example of climate change and an example of a change in weather. Theyhave come up with the following statements:1. The average temperature in the United States has been rising over the past 25 years.II. The temperature was warm on Monday but rainy and cold for the rest of the week.III. The amount of snowfall has been decreasing over the past few years.Which of the statements could be used as an example of a change in weather?OA. TonlyOB. ll onlyOC. Tand Ill onlyODall of these help me pls. my teacher asks a question and we are doing ratio.what is the smaller ratio, 32:24 or 30:22?I do not understand how to find the smaller ratio, I have five pages of notes and she hasn't explained, am I supposed to simplify and add and see which total is smaller? Who did Mr. Lewis say king really wanted to kill?StarrSevenDevanteOMaverick Find the surface area of the following figure with the given dimension