一起答
单选

实体联系模型(简称ER模型)中的基本语义单位是实体和联系。ER模型的图形表示称为ER图。联系可以同(37)实体有关。实体与实体之间的联系可以是(38)。

利用ER模型进行数据库的概念设计,可以分成3步:首先设计局部ER,然后把各个局部ER模型综合成一个全局的模型,最后对全局ER模型进行(39),得到最终的ER模型。

 ER模型向关系模式的转换规则是把一个实体类型转换成一个关系模式,实体的属性是关系的属性,实体的键是关系的键。把一个联系类型转换成一个(40),参与该联系类型的各实体的键以及联系的属性转换(41),其中的键由实体与实体之间的联系决定。

  • A.0个
  • B.1个或多个
  • C.1个
  • D.多个
参考答案
查看试卷详情
相关试题
  1. (127)

    • A.Cache
    • B.Buffer
    • C.Register
    • D.Trigger
  2. (128)

    • A.volume
    • B.space
    • C.capacity
    • D.size
  3. (126)

    • A.sequential
    • B.serial
    • C.chain
    • D.successive
  4. (125)

    • A.instant
    • B.temporary
    • C.timely
    • D.transient
  5. The "main storage" normally means that part of internal storage into which instructions and other data must be loaded for subsequent execution or processing. In large computing systems, the term "main storage" is(71) to "memory". "Buffer" mainly indicates a special-purpose storage or storage area allowing, through(72) storage, the data transfer between two functional units having different transfer characteristics. A buffer storage is used between non-synchronized devices or where one is(73) and the other is parallel or between those having different trans far rates. "(74) (memory)" is also a special-purpose buffer storage, smaller and faster than main storage, used to hold a copy of instructions and data obtained from main storage and likely to be needed next by the processor. "Register" is commonly composed of a part of internal storage having a specified storage(75) and usually intended for a specific purpose.

    • A.suitable
    • B.optional
    • C.choice
    • D.preferred
  6. (123)

    • A.predefined
    • B.predetermined
    • C.predicted
    • D.pmscheduled
  7. (122)

    • A.malicious
    • B.greedy
    • C.destructive
    • D.chaos
  8. (121)

    • A.usable
    • B.accessible
    • C.available
    • D.obtainable
  9. (120)

    • A.initiated
    • B.called
    • C.referenced
    • D.invoked
  10. (66) program propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infected program is(67). A virus often causes damage or annoyance and may be triggered by some event such as the occurrence of a predetermined date.Worm is a self-contained program that can propagate itself through data processing systems or computer networks. Worms are often designed by hackers to use up(68) resources such as storage space or processing time.Trojan horse implies by the name an apparently harmless program containing(69) logic that allows the unauthorized collection, falsification or destruction of data. Logic bomb causes damage to a data processing system when triggered by some specific system condition. Time bomb is also a malicious program being activated at a(70) time.

    • A.Worm
    • B.Virus
    • C.Disaster
    • D.Demon