1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
3 years ago
7

The WorkOrders table contains a foreign key, ClientNum, which must match the primary key of the Client table. What type of updat

e to the WorkOrders table would violate referential integrity? If deletes do not cascade, what type of update to the Client table would violate referential integrity? If deletes do cascade, what would happen when a client was deleted?
Computers and Technology
1 answer:
OlgaM077 [116]3 years ago
8 0

Answer:

Changing the customer number on a record in the Orders table to a number that does not match a customer number in the customer table would violate referential integrity.

If deletes do not cascade, deleting a customer that has orders would violate referential integrity.

If deletes cascade, customer can be deleted and all orders for that customer will automatically be deleted.

You might be interested in
A ________ describes the data and relationships that will be stored in a database.
nevsk [136]
Your missing word is Data model.
8 0
3 years ago
A technician wants to create a new partition on a new additional hard drive. what tool should be used?
Vitek1552 [10]
A Disk Defragmenter should be used
7 0
3 years ago
For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned
vfiekz [6]

Answer:

D)All of above

Explanation:

This is the complete question

For a typical program, the input is taken using _________.

A)Files

B)Command-line

C)scanf

D)All of above

E)None of these

computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.

7 0
3 years ago
The purpose of a function that does not return a value is
tatuchka [14]

Answer:

The answer to the given question is the option "a".

Explanation:

A function is a block of organized code that provides the reusability of the code. It is used to perform a separate, complex action. In programming languages name is different like, functions, methods, subroutines, procedures, etc. but the working of the function is the same. The purpose of the function that does not return a value is the option "a" and All the options are correct.  

5 0
3 years ago
Describe what skills are required by the helpdesk technician for each step in a typical incident process.
Shalnov [3]
They need to be organized
<span>Critical Thinking. Oftentimes, help desk technicians have flow charts or predefined procedures they can follow to resolve known problems. ...Written Communication. ...Active Listening. ...Verbal Communication. ...<span>Conflict Resolution. all these are good. Sorry about how long you had to wait and i hope this helps.</span></span>
6 0
3 years ago
Other questions:
  • Let’s say you are given the task of retouching a famous model’s photograph. To what extent will you retouch the image? In your o
    12·2 answers
  • __________ ensures that the individual is who they claim to be (the authentic or genuine person) and not an imposter.
    15·1 answer
  • In statistics, what is the mode of a data set?
    6·2 answers
  • Which of the following illustrates an example of a Boolean data type?
    9·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
    8·1 answer
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    9·1 answer
  • The lenght of a formula Can't be more than ________ characters​
    11·2 answers
  • Which of the following is NOT a media file? *<br> .wav<br> .mp4<br> .exe
    10·1 answer
  • Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!