1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Afina-wow [57]
3 years ago
10

If K is a foreign key in relation R1, then

Computers and Technology
1 answer:
givi [52]3 years ago
6 0

Answer: K is a key for some other relation.

Explanation:

  If K is a foreign key in relation R 1, then K is a key for some other relation as foreign key is the key which provide index relation table. It basically declared index of one table are related to another and place the constraint. And in the relation operator that comprises its value from all the rows in the table and it is used to prevent from destroy between the tables.

You might be interested in
In Vista and Windows 7, the Appearance and Personalization option allows you to change the
svetoff [14.1K]
Answer= background
Appearance of the laptop is called theme, it is also related to background
5 0
3 years ago
One main advantage of CD-ROMs is that
olga nikolaevna [1]
Another important advantage would be that the information you stored is portable and you may thus carry the CD right inside your pocket. Whenever you need it, you can retrieve it in a minute.
4 0
3 years ago
Read 2 more answers
Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
nika2105 [10]

Answer:

Users who do not follow secure computing practices and procedures

Explanation:

Most data breaches that occur as a result of hacking and cyber-attacks get all the attention. However, the kind of mistakes that employees make in corporate situations can sometimes be very costly. Whether accidental or not, human error is the leading cause of most information security breaches. When you have proper policies, people working in big organizations, for instance, will know how they are to do with them. Organizations should put more effort on its employees. By ensuring that secure computing practices and procedures are followed, it will help guide the workforce more effectively.

4 0
3 years ago
If I have 103.5% in my grade and if I got a 0/100 on a test, what do I have now in my grade?
kirill115 [55]
It might be an 81 because if you fail 0/100 yo grade is going DOWN
3 0
3 years ago
Read 2 more answers
What are Loop Errors? Describe briefly. What aresymptoms of Loop Errors?
victus00 [196]

Answer:

The errors in the loop condition such that it is not giving desired results or it is not running accordingly.There are different types of loop errors which are as following:-

1.Infinite loop:-When the is not able to stop then the error is called infinite loop. for ex:-

int i=1;

while(i!=0)

{

cout<<"I am King"<<endl;

i++;

}

2.Off by one error:-This error mostly happens in loop for arrays as indexing of the array is from 0 to size-1 .So looping over the array up to the size is a off by one error.

3.Equality v/s assignment operator error:-In this error the condition in the loop is like this d=f which is wrong since = is assignment operator it assigns the value of f to d while d==f checks that the value of d and f are equal or not.

4.&& v/s || loop error:- In this error we use and operator (&&) instead of or operator (||) and vice versa.

symptoms of loop errors are not the desired output.

4 0
3 years ago
Other questions:
  • A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.
    6·1 answer
  • An excel user should use a relative cell reference when it is important to ____. preserve the relationship to the formula locati
    7·1 answer
  • Question 2 (5 points)
    12·1 answer
  • This project involves writing a program that encodes and decodes messages. The program should prompt the user to select whether
    15·1 answer
  • Match the context details with the pattern that applies.
    7·1 answer
  • Your friends are having difficulties with their computer setups. Can you suggest a way to help each friend?
    5·1 answer
  • Identify the three fuzzy logic systems in the given text.
    10·1 answer
  • What does it mean when the lottery machine says function suppressed after scanning a ticket
    8·1 answer
  • Select the correct answer.
    12·1 answer
  • Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropb
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!