1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
4 years ago
11

Consider relations A and B. Relation A represents the entity on the ""one side"" of a one-to-many relationship; Relation B repre

sents the entity on the ""many side"" of the one-to-many relationship. The delete rule between relations A and B is restrict. If an attempt is made to delete a record in relation A and its primary key value appears as a foreign key value in one or more records of relation B ____.
Computers and Technology
1 answer:
nlexa [21]4 years ago
8 0

Answer:

All records of relation B related with that record of relation A will be deleted

Explanation:

After deletion of a record from relation A will delete all of the records from relation B where their <em>foreign key</em> is the <em>primary key</em> of the record being deleted from relation A.

You might be interested in
Which of these expressions evaluates to 5.5?
muminat

Answer:

Being assigned the value 10

3 0
3 years ago
The 8-bit ____ field is used by source network hosts and forwarding routers to distinguished classes or priorities in ipv6 packe
noname [10]
It is the 8-bit priority field hopes it helps

7 0
3 years ago
I don't know my password to brainly
garik1379 [7]
Only thing I can think of making a new account I’ve had to make 3 accounts sadly
7 0
3 years ago
Read 2 more answers
Consider the following implementation of a search method:
antiseptic1488 [7]

Answer:

-1

Explanation:

i = 5 and target is 4, hence the result will be -1 going to the else statement because its not equal to the target

6 0
2 years ago
Read 2 more answers
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
Leona [35]

Answer:

b. Enable Secret

Explanation:  Enable secret command is used to enable a secret password for a particular privilege level. It encrypts the desired password for entering the privileged executive mode of a router or switch. This encryption restrains the password from being saved in clear text format in configuration file contrary to enable password which is stored in plain text. Enable secret defines additional layer of security over the  enable password. It is based on MD5 hash algorithm. If both enable secret and enable password commands are configured, then enable secret outranks and overrides the enable password. Internetwork Operating System will only acknowledge the password as configured in the enable secret command. When you set a password using enable secret command, a password set using the enable password  command only works if enable secret is disabled or you are using older version of Cisco IOS software.

5 0
3 years ago
Other questions:
  • Show the printout of the following code.
    14·1 answer
  • Amanda needs to create an informative print brochure for her local library’s fundraiser dinner. What critical detail must she ha
    14·2 answers
  • What is the answer to this question?
    11·1 answer
  • Write a class named Accumulator containing: An instance variable named sum of type integer. A constructor that accepts an intege
    14·1 answer
  • Need help with photography
    12·1 answer
  • How do you think someone has programmed computer calculator?​
    13·1 answer
  • How do I use brainly.<br> What is brainliest.<br> And what is the rating thing about
    6·2 answers
  • When someone asks, Is this information specific enough?, he or she is interested in more _____.
    12·2 answers
  • You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
    14·1 answer
  • You're a volunteer at a local charity, and you've been asked to create a flyer for a fundraiser. The charity wants to send the f
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!