1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
4 years ago
8

When looking at a relationship between two tables on an ERD, the _____ table can be identified by the presence of a foreign key

constraint.
a) parent
b) child
c) lookup
d) value
Computers and Technology
1 answer:
Mariulka [41]4 years ago
6 0

Answer:

A

Explanation:

ERD diagram is a diagram which can illustrate the relation ships between different entities in a database. When we are referring the values of parent table in child table ,then a foreign key constraint will exist on child table to the parent table.so by looking at that foreign key constraint on child table we can identify the parent table. If we try to insert some value in child table which doesn't exist in parent table it will throw the foreign key violation error .

The Answer is A

You might be interested in
Why should you try to contact the technical support staff of a web hosting provider before you become one of its customers?
Marianna [84]

Answer: Contacting technical support can give you a general idea of the responsiveness of the web host provider to issues and problems. If the technical support staff is slow getting back to you at this point, don't be surprised if you get the same type of service when you have a problem and need immediate help. While not fail-safe, a quick response to a simple question at least gives the appearance of a well-organized, professional, and responsive technical support staff.

7 0
3 years ago
You want to draw a rectangle over the moon you added to your slide and then move it behind the moon. You want it to look like a
Ray Of Light [21]
I choose Home and it’s a good thing to have
5 0
3 years ago
Which of the following is the definition of red team?
marysya [2.9K]

Answer:

a. An open source port scanning and host detection utility. In a penetration test, this consists of penetration testers who have been given some background knowledge of the infrastructure.

Explanation:

b. Red team is special for checking to penetration test and there is no defend

c. They are not aware that penetration test is happening

d. The process is to check system security infrastructure by trying different types of penetration in unexpected ways.

a. <em>There is a special team created as called Red Team that they try to penetrate to the system with different methods. This test is longer and different then normal tests to detect is a system giving an alert for any action damaging to the system.</em>

3 0
3 years ago
Who plays Roblox and wants to be friends on it
qaws [65]
I have roblox and I would like to be friends on it
4 0
3 years ago
Read 2 more answers
Your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?
noname [10]

Answer:

DDR

Explanation:

DDR is the only type of RAM that runs on 184 pins, its successor DDR2 was upgraded to run on 240 pins.

Hope this helps!

4 0
3 years ago
Other questions:
  • Whenever I go onto Google Chrome, the words are in Spanish! How can I make the words be back in English again? Please let me kno
    7·1 answer
  • C programming Write a function named CalculateSphereVolume that takes one integer parameter intDiameter. The function should cal
    12·1 answer
  • Code Example 8-1
    13·1 answer
  • Help me please thankyou was
    5·1 answer
  • 8.8 Lab: Swapping variables Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the
    15·1 answer
  • With a DUI charge on a driver’s record A. the price of his/her insurance greatly increases. B. he/she may drive only during day
    5·2 answers
  • Select the correct answer.
    9·2 answers
  • How do mentors provide professional development opportunities?
    8·2 answers
  • Assume the data link protocol used by NDAS has the following associated characteristics:
    8·1 answer
  • What does an arrow after a command indicate
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!