1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
14

Which of the following can be created when two tables contain a common field?

Computers and Technology
1 answer:
cricket20 [7]3 years ago
8 0

Answer:

Referential key is the correct answer to the given question .

Explanation:

The Referential key is also known as foreign key .In the Referential key the foreign key table field  must be match with the field of primary key table in another table .  

The main objective of Referential key providing the interaction between the two tables also the Referential key is  provides the concept of referential integrity .

  • Primary key is used find the unique record in the database they are not created when the two tables contain the common field so that's why it is incorrect option.
  • Key template  and Relationship are not providing the linking between the two tables that's why it is incorrect option .
You might be interested in
Algorithm that has been coded into something that can be run by a machine.
hram777 [196]
The answer is program
8 0
3 years ago
9.10: Reverse ArrayWrite a function that accepts an int array and the array ’s size as arguments . The function should create a
AleksandrR [38]

Answer:

#include <iostream>

using namespace std;

int * reverse(int a[],int n)//function to reverse the array.

{

   int i;

   for(i=0;i<n/2;i++)

   {

       int temp=a[i];

       a[i]=a[n-i-1];

       a[n-i-1]=temp;

   }

   return a;//return pointer to the array.

}

int main() {

   int array[50],* arr,N;//declaring three variables.

   cin>>N;//taking input of size..

   if(N>50||N<0)//if size greater than 50 or less than 0 then terminating the program..

   return 0;

   for(int i=0;i<N;i++)

   {

       cin>>array[i];//prompting array elements..

   }

   arr=reverse(array,N);//function call.

   for(int i=0;i<N;i++)

   cout<<arr[i]<<endl;//printing reversed array..

   cout<<endl;

return 0;

}

Output:-

5

4 5 6 7 8

8

7

6

5

4

Explanation:

I have created a function reverse which reverses the array and returns pointer to an array.I have also considered edge cases where the function terminates if the value of the N(size) is greater than 50 or less than 0.

8 0
3 years ago
While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
Contact [7]
Use currency conversion dialog box select rupee to us dollar
8 0
3 years ago
_____ is responsible for packet forwarding. a. Transmission Control Protocol b. User Datagram Protocol c. Extensible Authenticat
Mazyrski [523]

Answer:

d. Internet Protocol

Explanation:

Internet Protocols suite  are used to transport packets from the host network across other networks. This task is usually performed by optimizing the size of each available packet, which are then forwarded through the internet protocol (IP) address.

Therefore, Internet Protocol is responsible for packet forwarding.

6 0
3 years ago
When Mary started college, her parents bought her a new computer that came loaded with the bare essentials in terms of software
Darina [25.2K]

Answer:

office online

Explanation:

office online is a free online version of Microsoft office suite. it includes Microsoft word, Microsoft excel,  Microsoft power point, one note. It allows users to create and edit files online.

5 0
3 years ago
Other questions:
  • What are the methods of identifying publicly switched networks?
    14·1 answer
  • What is a text designed for editing and authoring code is<br> A code editor <br> B
    9·1 answer
  • Due dates is the final date an assignment will be accepted. Plan ahead to ensure should you face difficulty with the assignment
    9·2 answers
  • Write a program whose inputs are three integers, and whose outputs are the largest of the three values and the smallest of the t
    10·1 answer
  • How many of yall are willing too sub to my channel called "Space Juice" with around 200 subs?!​
    6·1 answer
  • How does the system work for this:
    15·2 answers
  • Most C++ catastrophe vulnerabilities rely on uninitialized function pointers in a class.
    13·1 answer
  • If the fluid level in a battery is below the separators<br> should be added but never add
    5·1 answer
  • Describe four traditional tehniques for collecting information during analysis.
    11·1 answer
  • What commands does SuperKarel know that regular Karel does not?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!