1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helga [31]
3 years ago
11

____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere

ntial integrity b. ​ First normal form (1NF) c. ​ Database synchronization d. ​ Function dependency
Computers and Technology
1 answer:
maria [59]3 years ago
4 0

Answer:

The correct answer is Option A (Referential integrity)

Explanation:

When a relational database table is in ​first normal form, that means it has no repeating fields or groups of fields, and hence all rows have the same columns, while if a relational database table is in second normal form, it implies that every non-key field is functionally dependent on the primary key. If can be in the third normal form if no non-key field is functionally dependent on any other non-key field.​

A relational database on its own is a universal approved database model whose data is stored in tables divided into records and fields that serve as an information unit that organizes data points for easy access.

In the relational database, foreign keys are being checked to reference the primary key and enforce referential integrity so as to ensure that the foreign key must have a matching primary key. It means the reference from a row in one table to another table must be valid. Referential integrity concerns the concept of a foreign key normally enforced by the database management system.

You might be interested in
What age did people set in farming villages
Sveta_85 [38]
As young as 10 years old

have a good day :)

5 0
4 years ago
Read 2 more answers
what statement about constructors is false? group of answer choices all constructors are passed a pointer argument constructors
Hunter-Best [27]

A return type cannot exist in the constructor. It ought to produce and deliver fresh objects. Consequently, a compilation error would result.

Including a return type in a constructor declaration is not allowed. A constructor has to accept one or more input parameters. In the absence of explicitly declared constructors for the class, Java will give a default constructor. The name of the constructor should match the class name. 2) The compiler will automatically produce a default parameterless constructor for a class if you don't define one. 3) All instance variables are initialized to default values, such as 0, null, and super(), by the default constructor.

Learn more about variable here-

brainly.com/question/13375207

#SPJ4

4 0
1 year ago
Intellectual property does not include which of the following? A. the recipe for a brand of soft drink B. the lyrics and melody
jeka94
The answer you seek would be C. I just took this test C. was the correct answer
4 0
3 years ago
Read 2 more answers
Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A. Separat
Flura [38]

Answer:

Least Privilege

Explanation:

The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.

5 0
3 years ago
10. Question<br> Which statement is true about computer security?
Snowcat [4.5K]

Answer:

they cannot share your privacy with others without your concern

7 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • Look up and list the number of a local taxi or car service in your community. Include the company name and telephone number.
    13·1 answer
  • Given the macro definition and global declarations shown in the image below, provide answers to the following questions:
    5·1 answer
  • Which of the following describes an executive information system (EIS)?
    11·1 answer
  • someone help me my browser is updated I don't know what to do someone help me please I'm trying to watch Crunchyroll.​
    5·2 answers
  • Which of the following is an advantage of using variables?
    9·1 answer
  • . Which of the following refers to the informal rules for how to behave online? A.
    9·1 answer
  • The development of instant cameras is generally credited to Oskar Barnack, an
    8·2 answers
  • What is the duty of WHH? (white hat hackers)<br><br><br>ANY WHH HERE?<br>​
    8·1 answer
  • Several users on the second floor of your company's building are reporting that the network is down. you go to the second floor
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!