1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elena L [17]
2 years ago
11

What is the difference between referential and entity integrity

Computers and Technology
1 answer:
Lisa [10]2 years ago
3 0

Answer:

Explanation:

Referential integrity is the state in which all values of all foreign keys are valid. Referential integrity is based on entity integrity . Entity integrity requires that each entity have a unique key.

Hope this helped and have a good day

You might be interested in
When installing conduit for a mast service, what type of conduit should you use?
lesya692 [45]
The answer is (b) Rigid-metal

If you are installing a conduit for a mast service, the type of conduit to be used should be a rigid metal type. Among the three types of steel conduit, the most preferable to install is the rigid metal type instead of an intermediate metal conduit and electrical metallic tubing. Rigid metal conduit is a ferrous metal.
7 0
3 years ago
Read 2 more answers
Electronic ledger that tracks mathematical data
fenix001 [56]
<span>Spreadsheet software consists of an electronic ledger designed to perform mathematic calculations quickly </span>
6 0
4 years ago
With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
Wewaii [24]

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

8 0
3 years ago
Environmental technology examples
meriva

Exhaust Gas Recirculation (EGR) for NOx control
<span>Positive Crankcase Ventilation (PCV) for HC emission control </span>
Evaporative Emissions Control(EVAP)
<span>Catalytic Converter for HC and NOx control</span>
6 0
4 years ago
data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cry
Anton [14]

The data that is transmitted in plain text is option D: cryptographic failure.

<h3>An established plain text only assault is what?</h3>

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

brainly.com/question/10564419
#SPJ1

5 0
1 year ago
Other questions:
  • Assume the following variable definitions int a = 5, b = 12; double x = 3.4, z = 9.1. What are the values of the following expre
    7·1 answer
  • bj;ljfg'cfmb dfl kbslf jflk[gkdblkfd lbrkjlfbbfkjbdfjkbadbjbbkvbk'lbk'blbf;l;lkb lm;flklmkjlvkljvkljvbfbdsjsfbbjjlkbfjklbkfj'lgg
    9·2 answers
  • A tablet computer transmits a file over a wi-fi link to an access point.
    13·1 answer
  • How we can get NET I'D by IP Address?
    11·1 answer
  • THIS IS PYTHON QUESTION
    11·1 answer
  • Write a MATLAB program to accomplish the following: Create two vectors, a and b, where vector a contains all positive integers l
    10·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • Use the drop-down menus to answer the questions.
    6·1 answer
  • An installation is:<br> please help asap
    11·1 answer
  • What is the purpose of application software policies? Check all that apply.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!