1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
8

If one of the data values being entered into a table by the INSERT command violates an existing constraint, the remaining portio

n of the row will be added, but the data violating the constraint will need to be added at a later time using the UPDATE command. ​
Computers and Technology
1 answer:
Fittoniya [83]3 years ago
8 0

Answer:

False

Explanation:

If one of the data values being entered into a table by the INSERT command violates an existing constraint, the database raises an error and none of the records aimed in the insert command is added.

Thus, in insert command syntax and column specifications has to be met in order to add any values being entered.

You might be interested in
Which of the following is a set of short-range wireless technologies used to share information among devices within about two in
8_murik_8 [283]

Answer:

Option (c) NFC

Explanation:

  • The NFC Technology is a Wireless Technology which works in the range of 10 cm or less.
  • NFC stands for Near Field Communications.
  • The name itself indicates that it a communication mode with the near by objects.
  • The NFC technology is used in Access Cards, Payment Cards and Mobile Devices etc.
  • Option (a) IM - Instant Messaging is the instant text messaging technology sends and receives messages over the internet. It is used in Social Media where instant messaging is available. So, option (a) is not correct option.
  • Option (b) text messaging the technology is the technology in which the text messages are sent over the mobile networks ( in case of text messaging in mobile phones ) or over the internet ( emails, blogging etc). So, option (b) is not correct option.
  • Option (d) DES is not a short range wireless technology. So, option (d) is not correct.
  • Option (c) NFC is correct option.
3 0
3 years ago
For the question below, refer to the following recursive factorial method.
Mashcka [7]

Answer:

(d) 6

Explanation:

When we call factorial(3) first it will check if it greater than 1 since it is greater then return 3*factorial(2) will be called on factorial(2) it will again check that 2>1 since it is greater then return 2*factorial(1) will be called.In factorial(1) we have is not greater than 1 so it will return 1.return 2*factorial(1) will return 2 and 2 that is returned by factorial(2) will be multiplied with 3.So it will return 6.

8 0
4 years ago
What is the only way to remove a password encryption on an Excel file?
Olin [163]

Answer:

D.) Enter the password to open the workbook, and delete the password created in the Encrypt with Password box.

Explanation:

Maybe but I'm not sure

(sorry if its wrong)

8 0
3 years ago
Read 2 more answers
"How has graphic design changed through time?"
noname [10]

The main purpose behind graphic designing is to communicate, The different colors, shapes and patterns used in graphics aim to deliver a meaningful message, which sometimes is hidden. Back in the time, graphic designs usually portrayed what was going on at that time, for instance wars, with larger icons and catchy slogans. Over the time, the graphic designs have evolved where psychedelic, geometrical and monochromatic designs have gained more popularity, with different typographic styles to follow. Moreover, since the world has been taken over by technology in a storm, we get to see some drastic changes in the photography styles, use of color balances with minimal designs and subtle tones.

8 0
3 years ago
30 point!! Looking at your Personal Fact Sheet, do you see any areas that may need improvement? In which areas do you have the m
Paul [167]
Can you please provide us with a photo of your personal fact sheet?
7 0
4 years ago
Read 2 more answers
Other questions:
  • This is not homework but how do you fix this I’ve tried everything
    9·1 answer
  • The three devices you are going to install are a 2u server, a 1u keyboard tray, and an 8u space for a rack mounted moitor. Given
    6·1 answer
  • _____ is a method of computing that delivers secure, private, and reliable computing experiences based on sound business practic
    7·1 answer
  • Open the site in your browser. (If any pop-up windows appear, think about what they indicate about the web site before you close
    12·1 answer
  • Can anybody do Algorithm 2 for me (with Python).<br> Answer = 25 points.
    13·1 answer
  • Because of increasing advances in technology, there are careers available that weren’t even invented 10 years ago. One such care
    13·1 answer
  • HELLO. Which of the following is NOT a way to control the flow of a program?
    6·2 answers
  • By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a
    11·2 answers
  • How many basic elements of QBASIC are there
    14·1 answer
  • What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!