1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
7nadin3 [17]
3 years ago
7

When creating a database, in which step do you add foreign keys to tables?

Computers and Technology
1 answer:
lana66690 [7]3 years ago
8 0
Https://docs.microsoft.com/en-us/sql/relational-databases/tables/create-foreign-key-relationships 
You might be interested in
Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months
natka813 [3]

Group of answer choices.

A. The software was corrupt and resulted in a bug.

B. He purchased a license with maintenance for a year.

C. The organization discontinued the software.

D. He purchased an open-source license.

E. He purchase a perpetual non-maintenance license.

Answer:

B. He purchased a license with maintenance for a year.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

In this scenario, Wesley purchased a word-processing software program. He used it for a year, during which he got regular updates every two months. However, after a year, he was not allowed to update the software but he could continue using it.

This ultimately implies that, Wesley purchased a licensed software with maintenance for a year and as such he would stop receiving an update from the software developer after his subscription expired.

3 0
3 years ago
Please help me i’ll give you brainlist
Genrish500 [490]

answer: C

explanation: because it's the biggest of the given platforms

5 0
2 years ago
Buying a home security system is an example of protecting your home against________.
kow [346]

Answer:

Risk

Explanation:

Edge 2021

5 0
3 years ago
We can include following item(s) during configuration itemidentification:
Ainat [17]

Answer:

d) All of the above

Explanation:

In configuration management, the Identify configuration items, work products and related components are present.

  • All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
  • The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
  • Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
5 0
3 years ago
A bubble starts by comparing the first item in the list to all the remaining items, and swaps where the first item is ____ a lat
Alina [70]

Answer:

greater than

i think

5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a brief one parapragh summary describing the financial reality of the American family.
    10·1 answer
  • Write an expression to print each price in stock_prices. Sample output with inputs: 34.62 76.30 85.05
    9·1 answer
  • What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?
    15·1 answer
  • Lab 6B: printing a binary number
    13·1 answer
  • Briefly explain how Riboflavin deficiency lead to disease state.​
    15·1 answer
  • What is a closed system?​
    7·1 answer
  • NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP a
    15·1 answer
  • 2.
    13·1 answer
  • ANSWER QUICKLY!!! <br><br> Which aspect of planning is a preventive action?
    15·1 answer
  • write an algorithm to determine a student's final grade and indicate whether it is passing or failing. the final grade is calcul
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!