1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
11

____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere

ntial integrity b. ​ First normal form (1NF) c. ​ Database synchronization d. ​ Function dependency
Computers and Technology
1 answer:
maria [59]3 years ago
4 0

Answer:

The correct answer is Option A (Referential integrity)

Explanation:

When a relational database table is in ​first normal form, that means it has no repeating fields or groups of fields, and hence all rows have the same columns, while if a relational database table is in second normal form, it implies that every non-key field is functionally dependent on the primary key. If can be in the third normal form if no non-key field is functionally dependent on any other non-key field.​

A relational database on its own is a universal approved database model whose data is stored in tables divided into records and fields that serve as an information unit that organizes data points for easy access.

In the relational database, foreign keys are being checked to reference the primary key and enforce referential integrity so as to ensure that the foreign key must have a matching primary key. It means the reference from a row in one table to another table must be valid. Referential integrity concerns the concept of a foreign key normally enforced by the database management system.

You might be interested in
Program Convert Measurements:
worty [1.4K]

on the truth is that the walls

6 0
3 years ago
Write an example method that overrides the operator to create a new book whose title is a concatenation of the titles of two boo
Anastasy [175]

next time m8 mmmmmdsaasd

5 0
3 years ago
Write a program that prompts the user to enter a fraction in the following format (x/y). You may assume that the user will input
qaws [65]

Answer:

fraction = input("enter fraction x/y: ")

if len(fraction) == 3:

   if fraction[1] == "/":

       try:

           num = int(fraction[0])

           den = int(fraction[2])

           if num < den:

               print(f"{num}/{den} is a proper fraction")

           else:

               if num% den == 0

                   print(f"{num}/{den} is an improper fraction and can be reduced to {num/den}")

               else:

                   print(f"{num}/{den} is an improper fraction and can be reduced to {num//den} + {num - (den * (num//den))}/{den}")

       except ValueError:

           print("numerator and denominator must be integer numbers")

Explanation:

The try and except statement of the python program is used to catch value error of the input fraction of values that are not number digits. The program converts the numerator and denominator string values to integers and checks for the larger value of both.

The program prints the fraction as a proper fraction if the numerator is lesser and improper if not.

5 0
3 years ago
Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
DiKsa [7]

Answer:

Explanation:

Let's do this in python

(a) Between 5 and 60 and divisible by 5

for i in range(5, 60/5):

    print(5*i)

(b) Less than 200 and divisible and 2 and 7

for i in range(1, int(200/14) + 1):

    print(14*i)

(c)Sum of multiple of 8 that are between 100 and 500

sum_result = 0

for i in range(100, 500):

    if i % 8 == 0:

         sum_result += i

print(sum_result)

(d)sum of all odd numbers between 20 and 10

sum_odd = 0

for i in range(10, 20):

    if i % 2 == 1:

         sum_odd += i

print(sum_odd)

3 0
3 years ago
Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
zheka24 [161]

Answer:

The comparison is done based on their basic, principle, plaintext, key size, rounds, rounds name, security and speed. See the attached document.

Explanation:

The the attachment

8 0
4 years ago
Other questions:
  • Kaiden would like to find the list of physical disk drives that are connected to a Linux system. Which directory contains a subd
    14·1 answer
  • Two users, UserA and UserB, are engaging in secure communication using only asymmetrical encryption. UserA needs to send a secur
    11·1 answer
  • D-H public key exchange Please calculate the key for both Alice and Bob.
    12·1 answer
  • Meg logs into her email account without entering her user ID and password manually every time. She also finds results from searc
    11·1 answer
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    10·1 answer
  • I have an LG phone. I also haven't paid my phone bill yet, so I can't send text messages. I playfully texted texts to people and
    15·1 answer
  • Why is the term RAW image file generally used to describe a variety of file formats, which are sometimes known as digital raw ca
    13·1 answer
  • Write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs the smalle
    12·1 answer
  • You must configure a certificate authority on your network to use EFS. True or False?
    5·1 answer
  • Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!