Which of the following is NOT a step that you would take when creating an entity relationship diagram?

A) identify the attributes B) determine the functionality of the relationships
C) identify the relationships D) identify the entities


B

Computer Science & Information Technology

You might also like to view...

The ____ is a specialist in acquisition.

A. resource professional B. project professional C. procurement professional D. asset professional

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. A weakness of the IDES approach is its lack of flexibility. ?? 2. To be of practical use an intrusion detection system should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level. ? 3. ? System administrators can stop all attacks and hackers from penetrating their systems by installing software patches periodically. ? 4. Password crackers rely on the fact that some people choose easily guessable passwords. ?? 5. ?Traditional hackers usually have specific targets, or at least classes of targets in mind. ?

Computer Science & Information Technology

Which of the following indicates your location in the folder structure?

A) Taskbar B) Menu Bar C) Content pane D) Address Bar

Computer Science & Information Technology

Images can vary in quality and size.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology