1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
2 years ago
15

Referential integrity states that:______.

Computers and Technology
1 answer:
densk [106]2 years ago
7 0

Answer:

D. Each foreign key value MUST match a primary key value in another relation or the foreign key value must be null.

Explanation:

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

Referential integrity states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.

For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

<em>Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid. </em>

You might be interested in
Write about virus in five points.​
kvasek [131]
A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
5 0
2 years ago
If you want to adjust the width of a column manually, move your mouse over the _______ column boundary and click and drag until
Luda [366]

Answer:

The answer is "Right".

Explanation:

In computer science, editing is the primary activity, which is used by the users to handles graphics, tables, and other things. It can be divided into two types first is internal(default) and the second is manual.

  • In the manual editing, to edit the column of the table we just right click on the column.
  • It enables you to edit option, in which we edit column according to our desire.
6 0
3 years ago
Sam has created a fashion website. There are many subscribers to his website. He has added new blogs, pictures, and articles abo
marusya05 [52]

Answer:

Post advertisements on social media and message the subscribers.

Explanation:

There is no point in not promoting and putting forward the work that he has been doing. All of the given options are about promoting the content but Sam needs to choose the ones which are efficient and seem professional as well.

Posting advertisements about the website promotes the content on a wider base and helps in luring more and more people to the website.

Messaging or sending an email to the subscribers is a healthy of letting the subscribers about the updates and latest posts.

8 0
3 years ago
The phone in your hand is a computer. So too is the machine that occupies a 100,000 square foot data center. Given their vast di
Dmitry [639]

Answer:

Well when you think about it they both do the same thing but they are diffirent, they have the same perpose but diffirent parts in them so, when you compair them the phone is smaller and slower, the bigger the computer the better it is depending on the amount of money spent on parts.

5 0
2 years ago
Write a method that takes two circles, and returns the sum of the areas of the circles.
11111nata11111 [884]

Answer:

public static double areaSum(Circle c1, Circle c2){

 double c1Radius = c1.getRadius();

 double c2Radius = c2.getRadius();

 return Math.PI * (Math.pow(c1Radius, 2) + Math.pow(c2Radius, 2));

public static void main(String[] args){

 Circle c1 = new Circle(6.0);

 Circle c2 = new Circle(8.0);

  areaSum(c1,c2);

 }

Explanation:

7 0
2 years ago
Other questions:
  • My computer have black spots and line
    7·2 answers
  • Computers are not just stand-alone desktop machines anymore. They are often embedded in common appliances and technology that we
    6·1 answer
  • Which should you use to find a saved file?
    15·2 answers
  • Why is e-mail better for informative and positive messages than for negative ones?
    6·1 answer
  • How do you write the slope-intercept form?
    5·1 answer
  • Lexi wants to buy a $300 painting. when she gets to the store, she finds that it is on sale for 40% off. how much does Lexi spen
    10·1 answer
  • Solve a single producer, single consumer problem using wait() and notifyAll(). The producer must not overflow the shared buffer,
    5·1 answer
  • which of the following devices and and receive information from other device? a parallel port B serial port C video port d both
    8·1 answer
  • Please help i only have 20 minuets
    5·1 answer
  • Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!