1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
noname [10]
2 years ago
15

Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D

. The DBMS
Computers and Technology
1 answer:
slega [8]2 years ago
4 0

Integrity constraints are enforced by The database designer.

<h3>What are Integrity constraints?</h3>

An  Integrity Constraints is known to be the protocols that a table's data columns is mandated to follow.

Note that they are used to hinder the types of information that can be put into a table and as such, Integrity constraints are enforced by The database designer.

Learn more about Integrity constraints from

brainly.com/question/28026113

#SPJ1

You might be interested in
What are two examples of ways an electronic record may be distributed to others?
Karolina [17]

Answer:

Way 1. Email, Way 2. Publish on Internet

Explanation:

8 0
3 years ago
Technologies are having a negative impact on businesses.
Aloiza [94]

Answer: False

Explanation: I think its false because technologie has had a good impact on businesses.

4 0
3 years ago
You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store
sleet_krkn [62]

Answer:

QR code

Explanation:

QR Code. Short for quick response code, which can also be called 2-D bar code, a QR code is a type of two-dimensional (2D) barcode that are read with the aid of a QR barcode reader or a camera-enabled smartphone with an inbuilt or installed QR reader software.

A QR code is capable of carrying information in both the vertical and the horizontal direction, which is the reason behind the name 2D barcode.

3 0
2 years ago
A(n) ____ is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large compu
Taya2010 [7]
I think it'd be terminal concentrator.  A(n) terminal concentrator is a front - end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer. 
7 0
3 years ago
Which feature of a blog allows an author to interact and get feedback from his or her readers? link pingback commenting TweetMem
poizon [28]
Commenting. When someone comments of a blog the blog's writer can comment back, to answer questions, etc.
6 0
2 years ago
Other questions:
  • Hub is used in Twisted pair Ethernet. True/False
    6·1 answer
  • Which is the most efficient way to italicize a row of text in every worksheet in a workbook?
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • Public-key cryptography can be used for encryption (ElGamal for instance) and key exchange. Furthermore, it has some properties
    9·2 answers
  • What is are motor vehicle emissions?
    8·1 answer
  • Create a class named Invoicing that includes three overloaded computeInvoice() methods for a book store: see pages 196 for examp
    7·1 answer
  • According to the stage-gate process developed by Robert G. Cooper, _____ are the results of the previous stage and are the input
    15·1 answer
  • Question # 1
    12·2 answers
  • Insert in the Current Values section at the top of the worksheet summary functions that use the range I9:I54. In cell I2, calcul
    7·1 answer
  • Brainly not working for me not showing any ads or answers
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!