We can classify entities as being either strong or weak. A strong entity is not dependent on the existence of another entity for its primary key. A weak entity is partially or wholly dependent on the existence of another entity, or entities, for its primary key. For example, as we can distinguish one actor from all other actors and one video from all other videos without the existence of any other entity, Actor and Video are referred to as being strong entities. In other words, the Actor and Video entities are strong because they have their own primary keys. An example of a weak entity called Role, which represents characters played by actors in videos. If we are unable to uniquely identify one Role entity occurrence from another without the existence of the Actor and Video entities, then Role is referred to as being a weak entity. In other words, the Role entity is weak because it has no primary key of its own.
kalvinspartan answered the question on July 7, 2018 at 08:39
- Provide an example of a relationship with attributes(Solved)
Provide an example of a relationship with attributes
Date posted: July 7, 2018. Answers (1)
- Describe what multiplicity represents for a relationship.(Solved)
Describe what multiplicity represents for a relationship.
Date posted: July 7, 2018. Answers (1)
- What are business rules and how does multiplicity model these constraints?(Solved)
What are business rules and how does multiplicity model these constraints?
Date posted: July 7, 2018. Answers (1)
- How does multiplicity represent both the cardinality and the participation constraints on a relationship?(Solved)
How does multiplicity represent both the cardinality and the participation constraints on a relationship?
Date posted: July 7, 2018. Answers (1)
- Perform addition and subtraction operation on the following two floating point operands. ...(Solved)
Perform addition and subtraction operation on the following two floating point operands.
A = 0 10001 011011
B = 1 01111 101010
A and B are represented in a 12-bit format. The scale factor has an implied base of 2 and a 5-bit excess-15 exponent. The 6-bit mantissa is normalized as in the IEEE format, with an implied 1 to the left of the binary point.
Date posted: July 7, 2018. Answers (1)
- Divide 14 by 3 using restoring and non restoring division. Show all the steps. No partial credit will be awarded unless all steps are shown.
(Solved)
Divide 14 by 3 using restoring and non restoring division. Show all the steps. No partial credit will be awarded unless all steps are shown.
Date posted: July 7, 2018. Answers (1)
- Multiply the following pair of signed 2’s complement numbers using the Booth algorithm. Assume A is the multiplicand and B is the multiplier. Show all...(Solved)
Multiply the following pair of signed 2’s complement numbers using the Booth algorithm. Assume A is the multiplicand and B is the multiplier. Show all the steps. No partial credit will be awarded unless all steps are shown.
A = 010111, B = 110110
Date posted: July 7, 2018. Answers (1)
- Convert the following numbers: (a) –347 into 2’s complement binary (b)243.124 into floating point form.(Solved)
1. Convert the following numbers:
(a) –347 into 2’s complement binary
(b) 243.124 into floating point form.
Date posted: July 7, 2018. Answers (1)
- Discuss the purpose of analyzing the transactions that have to be supported and describe the type of information you would collect and analyze.(Solved)
Discuss the purpose of analyzing the transactions that have to be supported and describe the type of information you would collect and analyze.
Date posted: July 4, 2018. Answers (1)
- Discuss some of the main reasons for selecting a column as a potential candidate for indexing. Give examples to illustrate your answer.(Solved)
Discuss some of the main reasons for selecting a column as a potential candidate for indexing. Give examples to illustrate your answer.
Date posted: July 4, 2018. Answers (1)
- When would you not add any indexes to a table?(Solved)
When would you not add any indexes to a table?
Date posted: July 4, 2018. Answers (1)
- Having identified a column as a potential candidate, under what circumstances would you decide against indexing it? (Solved)
Having identified a column as a potential candidate, under what circumstances would you decide against indexing it?
Date posted: July 4, 2018. Answers (1)
- Describe the access control facilities of SQL.(Solved)
Describe the access control facilities of SQL.
Date posted: July 4, 2018. Answers (1)
- Discuss the difference between system security and data security(Solved)
Discuss the difference between system security and data security
Date posted: July 4, 2018. Answers (1)
- Explain the meaning of denormalization.(Solved)
Explain the meaning of denormalization.
Date posted: July 4, 2018. Answers (1)
- Describe the two main approaches to partitioning and discuss when each may be an appropriate way to improve performance. Give examples to illustrate your answer(Solved)
Describe the two main approaches to partitioning and discuss when each may be an appropriate way to improve performance. Give examples to illustrate your answer
Date posted: July 4, 2018. Answers (1)
- What factors can be used to measure efficiency?(Solved)
What factors can be used to measure efficiency?
Date posted: July 4, 2018. Answers (1)
- State and discuss how the four basic hardware components interact and affect system performance(Solved)
State and discuss how the four basic hardware components interact and affect system performance
Date posted: July 4, 2018. Answers (1)
- How should you distribute data across disks?(Solved)
How should you distribute data across disks?
Date posted: July 4, 2018. Answers (1)
- Compare and contrast a DDBMS with distributed processing. Under what circumstances would you choose a DDBMS over distributed processing?(Solved)
Compare and contrast a DDBMS with distributed processing. Under what circumstances would you choose a DDBMS over distributed processing?
Date posted: July 4, 2018. Answers (1)