A(n) ____ entity is composed of the primary keys of each of the entities to be connected.

a. associative
b. recursive
c. unary
d. binary


Answer: a. associative

Computer Science & Information Technology

You might also like to view...

The most common source of Web-browser exploits is _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is not used to evaluate a corporate website?

A) Learn about the pages that have been accessed. B) Use "Web bugs" to gather information about the customer. C) Collect visitor demographics, such as the geographic region or city. D) Find out who is referring the Web site visitors to your Web site. E) Determine the browser that the visitor is using.

Computer Science & Information Technology

The link element media type value "screen" is intended for use with ____ screens.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What type of search does the following function implement?bool aSearch (int list[ ], int last, int target, int* locn ){   int begin, mid, end;   begin = 0;   end = last;   while (begin <= end)   {      mid = ( begin + end ) / 2;      if ( target > list[ mid ] )         begin = mid + 1;      else if ( target < list[ mid ] )         end = mid - 1;      else         begin = end + 1;   }   *locn = mid;   return (target == list [mid]);}

A. sequential search B. probability search C. ordered list search D. binary search

Computer Science & Information Technology