1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anvisha [2.4K]
3 years ago
5

If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o

f "____________________" and "not null" constraints.
Computers and Technology
1 answer:
Colt1911 [192]3 years ago
6 0
Hello  <span>Abigailguzman6347</span><span>


</span>Answer: If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use of "unique index" and "not null" constraints.

Hope This Helps!
-Chris
You might be interested in
What is Frederick Taylor attributed to doing
Wewaii [24]

Answer:

Frederick Winslow Taylor (March 20, 1856 – March 21, 1915) was an American mechanical engineer. He was widely known for his methods to improve industrial efficiency.[1] He was one of the first management consultants.[2] In 1911, Taylor summed up his efficiency techniques in his book The Principles of Scientific Management which, in 2001, Fellows of the Academy of Management voted the most influential management book of the twentieth century.[3] His pioneering work in applying engineering principles to the work done on the factory floor was instrumental in the creation and development of the branch of engineering that is now known as industrial engineering. Taylor made his name, and was most proud of his work, in scientific management; however, he made his fortune patenting steel-process improvements. As a result, Scientific management is sometimes referred to as Taylorism.

Explanation:

7 0
2 years ago
Variables set equal to patterns are said to be:_______.
NemiM [27]

Answer:

b. instantiated.

Explanation:

In computer programming, to be instatiated or when variables are instatiated; this simply refers to the acts of making example out of a group variables or a form of template. For example in a situation of class of objects.

Hence, in this case, the correct answer to the question above is the option B, in which Variables set equal to patterns are said to be INSTATIATED

5 0
3 years ago
What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag
Burka [1]

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

8 0
3 years ago
Read 2 more answers
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
Which TWO of these correctly describe a Trojan horse malware?
mina [271]
The first one and last one
6 0
3 years ago
Read 2 more answers
Other questions:
  • From the video "Your Password Sucks", using computer power to guess your password by trying multiple variations one after the ot
    15·2 answers
  • Write a program to read data from a file named problem 2. ext. This file has three exams data (floating point data) in three col
    11·1 answer
  • Guys i really need help pleasure?
    7·2 answers
  • Haley is helping to choose members for a customer satisfaction team. Which
    6·1 answer
  • VEE Physics 2006 E.C
    7·1 answer
  • Describe the importance of human interaction in a computing system.
    14·2 answers
  • Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and
    11·1 answer
  • Did brainly.com go down today? i coudlnt get in it
    15·2 answers
  • What are hardware and software?<br><br><br><br> WILL MARK BRAINIEST
    9·2 answers
  • PLEASE PLEASE PLEASE PLEASE help me Im completly lost will give brainliest and 50 points
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!