1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
14

Which of the following can be created when two tables contain a common field?

Computers and Technology
1 answer:
cricket20 [7]3 years ago
8 0

Answer:

Referential key is the correct answer to the given question .

Explanation:

The Referential key is also known as foreign key .In the Referential key the foreign key table field  must be match with the field of primary key table in another table .  

The main objective of Referential key providing the interaction between the two tables also the Referential key is  provides the concept of referential integrity .

  • Primary key is used find the unique record in the database they are not created when the two tables contain the common field so that's why it is incorrect option.
  • Key template  and Relationship are not providing the linking between the two tables that's why it is incorrect option .
You might be interested in
Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
Darya [45]

Answer:

B) security as a service I'm just doing the work

4 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
erica [24]

Answer:

Router

Explanation:

Routers have something called a WAN link, which can be used to connect 2 local area networks

7 0
3 years ago
What is the numeric range of a 16-bit twos complement value? A 16-bit excess notation value? A 16-bit unsigned binary value?
blagie [28]

Answer:

twos complement value is (-2^15 -1) -32768 to 32767.

excess notation value is -32768 to 32767.

unsigned binary value is (2^16) 0 to 65535

Explanation:

Excess notation: used to represent signed integers. Always uses fixed number of bits with leftmost representing the sign.

Twos complement notation: As opposed to excess notation, a sign bit of 0 is used to represent the non-negative (+) sign and a 1 for the negative (-); again, zero is included in the non-negative set.

Unsigned Binary values: are binary values/bits that don't have signs

7 0
3 years ago
Can any software run on any processor
jekas [21]

Answer:

Yes.

Explanation:

Your software requires CPU instruction if CPU doesn't provide that instructions the software won't work/run.

hope this helps you

have a great day:)

6 0
2 years ago
The Save command is located
tatiyna

Answer:

the save command is located in the file menu

4 0
3 years ago
Other questions:
  • A security policy is a
    11·1 answer
  • Options to rotate cells in excel are available using the _____ button in the alignment group on the home tab.
    10·1 answer
  • IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
    11·1 answer
  • How does a hard drive work?
    5·1 answer
  • When discussing the data-modeling building blocks, anything (a person, a place, a thing, or an event) about which data are to be
    15·1 answer
  • Instructions:Select the correct answer from each drop-down menu. What type of font color should Kim select if she chooses a dark
    10·2 answers
  • What command would you use to add a file to an e-mail message?
    15·2 answers
  • What will be the index of leaf node in a right-skewd binary tree with height =7,where every parent has at most one child?​
    15·1 answer
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!