Overlap refers to the fact that the same entity instance may be a member of more than one subclass of the specialization. Consider the example of CRICKET PLAYER. Here CRICKET PLAYER is the supertype. The subtype can be BOWLER, BATSMAN.
Mwalimu Bonface answered the question on March 1, 2018 at 09:56
- What is inheritance in generalization hierarchies? (Solved)
What is inheritance in generalization hierarchies?
Date posted: March 1, 2018. Answers (1)
- Guidelines for designing a good pseudo code. (Solved)
Guidelines for designing a good pseudo code.
Date posted: February 28, 2018. Answers (1)
- Explain the meaning of “what if analysis” in spreadsheets(Solved)
Explain the meaning of “what if analysis” in spreadsheets
Date posted: February 28, 2018. Answers (1)
- Distinguish between Hard system and soft system(Solved)
Distinguish between Hard system and soft system
Date posted: February 28, 2018. Answers (1)
- State two reasons for partitioning a disk. (Solved)
State two reasons for partitioning a disk.
Date posted: February 28, 2018. Answers (1)
- Differentiate between partitioning and formatting as used in disk management.(Solved)
Differentiate between partitioning and formatting as used in disk management.
Date posted: February 28, 2018. Answers (1)
- Define the following features of a desktop:(a)icons (b)task bar (c)background (d)recycle bin(Solved)
Define the following features of a desktop:
(a)icons
(b)task bar
(c)background
(d)recycle bin
Date posted: February 28, 2018. Answers (1)
- Differentiate between Entity type and Entity set. (Solved)
Differentiate between Entity type and Entity set.
Date posted: February 28, 2018. Answers (1)
- Define entity as used in DBMS with example? (Solved)
Define entity as used in DBMS with example?
Date posted: February 28, 2018. Answers (1)
- Define the concept of “database schema.” Describe the types of schemas
that exist in a database complying with the three levels ANSI/SPARC architecture.(Solved)
Define the concept of “database schema.” Describe the types of schemas
that exist in a database complying with the three levels ANSI/SPARC architecture.
Date posted: February 28, 2018. Answers (1)
- What is poor email etiquette?(Solved)
What is poor email etiquette?
Date posted: February 28, 2018. Answers (1)
- What the name for the program or service that lets you view e-mail messages?(Solved)
What the name for the program or service that lets you view e-mail messages?
Date posted: February 28, 2018. Answers (1)
- With the use of internet, email has become part and parcel of communication. Briefly describe the negative impact it brings.(Solved)
With the use of internet, email has become part and parcel of communication. Briefly describe the negative impact it bring.
Date posted: February 28, 2018. Answers (1)
- The internet is making the world to be a global village with easier communication of email. Describe the advantages of using email for communication.(Solved)
The internet is making the world to be a global village with easier communication of email. Describe the advantages of using email for communication.
Date posted: February 28, 2018. Answers (1)
- State a specific example where each of the following types of computers can be used: super computer, mainframe computer, minicomputer, micro computer(Solved)
State a specific example where each of the following types of computers can be used:
Super computer
Mainframe computer
Minicomputer
Micro computer
Date posted: February 28, 2018. Answers (1)
- After a system is implemented, it is evaluated. Give 3 reasons why a system should be evaluated.(Solved)
After a system is implemented, it is evaluated. Give 3 reasons why a system should be evaluated.
Date posted: February 27, 2018. Answers (1)
- Outline the seven open systems interconnection ( OSI ) reference model Layers in their order(Solved)
Outline the seven open systems interconnection ( OSI ) reference model Layers in their order
Date posted: February 27, 2018. Answers (1)
- Explain the meaning of the terms below as used in data security and controls. (i) Information security (ii) Fraud (iii) Eavesdropping (Solved)
Explain the meaning of the terms below as used in data security and controls.
(i) Information security
(ii) Fraud
(iii) Eavesdropping
Date posted: February 27, 2018. Answers (1)
- Make a clear difference between Log file and Firewall.(Solved)
Make a clear difference between Log file and Firewall.
Date posted: February 27, 2018. Answers (1)
- Give FOUR reasons why operating systems were developed. (Solved)
Give FOUR reasons why operating systems were developed.
Date posted: February 27, 2018. Answers (1)