1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
3 years ago
8

Orphan record example?

Computers and Technology
1 answer:
Goryan [66]3 years ago
4 0

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

You might be interested in
In two to four sentences, describe how you would select a function.
Mila [183]

Explanation:

As a result, it is important not to overlook any of the sources of information that indicate what the form of the model should be. Answer Not ...

Knowing Function Types Helps: Another helpful ingredient in model selection

5 0
3 years ago
Can anybody explain to me why it says i have a message,but when i go to my inbox it's empty??
Zanzabum

Answer:

sameee ion know why tbh

Explanation:

4 0
3 years ago
Read 2 more answers
SHA-1 gives 160-bit secure hash. Let's assume that a successful brute force attack is possible by trying 2^(160/3) combinations.
pochemuha

Answer:

C) double SHA-1 is stronger because it requires about 2^(160/3) X 2^(160/3) maximum combinations because for each broken first stage, there are 2^(160/3) brute force attempts may be needed.

Explanation:

Double SHA will require about 2^(160/3) X 2^(160/3). for each statage we need to check the 2^(160/3) combinations means it will take lot of time.

4 0
3 years ago
True/False: A datasum can be generated for any width of data. For example, we can create an 8, 16, or 32 bit datasum for 8, 16,
Zolol [24]

Answer:

true

Explanation:

6 0
3 years ago
The final step of the DHCP Discovery process is known as ______.
Whitepunk [10]
<span>The final step of the DHCP Discovery process is known as </span>DHCPACK. It is the final step when the DHCP server sends the requested IP addresses to the client in an acknowledgment packet and records that information in its database. It sends a successful acknowledgement to the client.
6 0
3 years ago
Other questions:
  • What is a Software Quality Assurance Audit?
    12·1 answer
  • What is the size of the program counter for an avr that has a 1 kbyte rom capacity?
    9·1 answer
  • What is similar software engineering, Hardware engineer, Network Architect, and Web developer?
    11·1 answer
  • Information taken directly from an existing classified source and stated verbatim in a new or different document is an example o
    10·1 answer
  • Write the following word or words in Spanish.<br><br> the male teacher
    14·2 answers
  • Can nano gold be a way possibly reduce or kill cancer cell growth?
    13·1 answer
  • Please help thank you !!!
    7·2 answers
  • A spreadsheet contains the maximum weight and maximum height for fifty dog breeds. The breeds are located in rows, and the weigh
    5·1 answer
  • System.out.print();
    10·1 answer
  • From your analysis, do you think you’ve seen all of the servers and hosts that make up the Amazon e-commerce site? How does Amaz
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!