1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
5

If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o

f "____________________" and "not null" constraints.
Computers and Technology
1 answer:
Colt1911 [192]3 years ago
6 0
Hello  <span>Abigailguzman6347</span><span>


</span>Answer: If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use of "unique index" and "not null" constraints.

Hope This Helps!
-Chris
You might be interested in
Put these operating systems in order according to the date they were released. (The first to be released would be
uysha [10]
1. ms-dos 1981
2. windows 2.0 1987
3. windows xp 2001
4. mac os 2001
5. windows 7 2009
8 0
3 years ago
What is the best scenerio for
Stels [109]

Answer:

the teacher said a (dash) reads pages on website pls answer me now i have to write it now

5 0
3 years ago
Read 2 more answers
__ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital
LenaWriter [7]

Answer:

Embedded Operating System

Explanation:

An embedded operating system is a specialized operating system dedicated to perform a unique task for a digital device other than your desktop or laptop. For example, we can find this operating system appears in a washing machine to enable user to control the operation of the washing machine. This type of operating system is designed to be more resource efficient. An embedded operating system can also found in cars, digital television, ATM machine, digital camera etc.

3 0
3 years ago
In Scratch, you have to choose backdrops from a limited number in the Scratch image library.
forsale [732]
I would say it would be True
5 0
3 years ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
Other questions:
  • ANSWER IN 5 MINUTES TO GET 50 POINTS!!!
    13·1 answer
  • To gain one pound of fat, how many extra calories would you need to consume?
    12·1 answer
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • When selecting text in word, holding down the ctrl key while clicking the mouse button will select the?
    15·1 answer
  • The version of Windows that first provided networking capabilities was _____.
    12·2 answers
  • (Analyze scores) Write a program that reads an unspecified number of scores and determines how many scores are above or equal to
    10·1 answer
  • Justin signed a rental agreement for his new condo. How long is his lease? a p e x
    15·1 answer
  • Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is
    6·1 answer
  • Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
    10·2 answers
  • Rewrite the Espresso Counter program to Swap or interchange any two rows of the output. Copy and paste just the interchanged par
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!