1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
3 years ago
7

The WorkOrders table contains a foreign key, ClientNum, which must match the primary key of the Client table. What type of updat

e to the WorkOrders table would violate referential integrity? If deletes do not cascade, what type of update to the Client table would violate referential integrity? If deletes do cascade, what would happen when a client was deleted?
Computers and Technology
1 answer:
OlgaM077 [116]3 years ago
8 0

Answer:

Changing the customer number on a record in the Orders table to a number that does not match a customer number in the customer table would violate referential integrity.

If deletes do not cascade, deleting a customer that has orders would violate referential integrity.

If deletes cascade, customer can be deleted and all orders for that customer will automatically be deleted.

You might be interested in
Okay I need help. In the first picture, the black glasses, that was my vision last year 52:17 135 and my vision now is 52:15 135
Aleksandr-060686 [28]
Bbetter I think glasses are better this year but also the dates. your eyes over tim adjust to things like glasses to help see so when yu got better glasses it got better
3 0
3 years ago
This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
NNADVOKAT [17]

Answer:

NAT

Explanation:

Network Address Translation (NAT) allows nonroutable IP prefixes to hide behind a routable address.it translates IP addresses and ports of its internal hosts, hiding the true endpoint of an internal host on a private network.

Using NAT in this way allows network engineers to efficiently route internal network traffic to the same resources, and allow access to more ports, while restricting access at the firewall.

4 0
3 years ago
Different the need for external or secondary memory​
alexira [117]

Answer:

Secondary storage is needed to keep programs and data long term. Secondary storage is non-volatile , long-term storage. Without secondary storage all programs and data would be lost the moment the computer is switched off.

External storage enables users to store data separately from a computer's main or primary storage and memory at a relatively low cost. It increases storage capacity without having to open up a system.

4 0
3 years ago
According to the reading on the course web pages, the earliest usage of cooking began around _____ million years ago.
fenix001 [56]

Answer:

According to the reading on the course web pages, the earliest usage of clothes began around ____ million years ago. 3.4 1.5 0.8 0.5 1.7 2. According to the reading on the course web pages, lime mortar was probably discovered from annealing: Charcoal Obsidian Flint Glass 3.

Explanation:

6 0
3 years ago
Which of the following is NOT true about a savings account
Andrew [12]

Answer: Withdraws

Explanation:

You can withdraw how ever many times you want from a savings account

4 0
3 years ago
Other questions:
  • To pinpoint an earthquake's location, scientists need information from how many seismometers?
    8·1 answer
  • Bill needs to make a presentation in which he has to represent data in the form of a pyramid. Which feature or menu option of a
    10·2 answers
  • I need help plz it keeps on happening and idk what to do
    12·1 answer
  • What is a web designer's favorite snack
    12·2 answers
  • Which of the following statements is true?
    5·1 answer
  • To delete a row, you must first
    8·1 answer
  • In the digital age we have less time to absorb and make sense of new information
    12·2 answers
  • Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
    5·1 answer
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • Which is the fastest memory in computer​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!