1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
5

a rule that states each foreign key value must match a primary key value in the other relation is called the

Computers and Technology
1 answer:
makvit [3.9K]3 years ago
3 0

Answer:

Referencial Integrity Contraint

Explanation:

The referential integrity constraint states that the customer ID i.e (CustID) in the Order table must match a valid CustID in the Customer table. Most relational databases have declarative referential integrity. That is to say, when the tables are created the referential integrity constraints are set up so as to maintain the quality of information.

You might be interested in
Which is the best description of the laws governing IT professionals?
Vinvika [58]

Answer: D, Most laws are directed at the information, data, or intellectual property rather than the IT professional.

Explanation:i just took the test

4 0
3 years ago
What are the modes of operation of WLANs?
Nimfa-mama [501]

Answer:

WLAN's or Wireless LAN Units have 2 main modes of operation

Explanation:

The Two Main modes of Operation are the following

<u>Infrastructure Mode:</u> in this mode the main WLAN unit becomes the main connection point in which all devices are connected to and the main unit provides an internet connection to all the devices connected to it.

<u>Ad Hoc Mode:</u> in this mode devices transfer data from one another back and forth without permission from a base unit.

Some WLAN units will also include 2 extra modes of operation called Bridge and Wireless Distribution System (WDS).

<u>Bridge Mode:</u> this mode allows the base unit to act as an intermediary and bridge two different connection points. Such as bridging a wired connection with a wireless one.

<u>WDS Mode:</u> this mode uses various access points to wirelessly interconnect devices to the internet using repeaters to transmit connections. It can provide internet to both wired and wireless clients.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Which is a sentence fragment?
ehidna [41]
C is a sentence fragment it does not have a verb
5 0
3 years ago
Why isn't my brainly camera working? I got Brainly Plus and can't even scan questions. I've logged out, I've uninstalled and rei
N76 [4]

Answer:

Try resetting your device.

Explanation:

In order to send and receive iMessages to your iPhone, iMessage must be enabled. By doing this, you will associate your phone number with the email address used for your Apple ID or iCloud account.

8 0
3 years ago
Which of the following describes the IP address of a router to which packets destined for a remote network should be sent by def
Elena-2011 [213]

The term that describes the IP address of a router to which packets destined for a remote network should be sent by default is the a gateway of last resort.

<h3>What is 'Gateway Of Last Resort'? </h3>

A Gateway of Last Resort is known to be the Default gateway and this is said to be a route that is known to be often used by the router if no other known route is seen to transmit the IP packet.

Note that Known routes are seen in the routing table. but, any route not known by the routing table is said or known to be forwarded to the default route.

Hence the primary function of a router is so that it can forward packets toward a given destination.

Therefore, The term that describes the IP address of a router to which packets destined for a remote network should be sent by default is the a gateway of last resort.

Learn more about IP address from

brainly.com/question/24930846

#SPJ1

3 0
2 years ago
Other questions:
  • (Drag each tile to the correct box)While surfing online, Patricia first checks her email and reads the latest messages. She then
    8·1 answer
  • ____________________ is the premeditated, politically motivated attacks against information, computer systems, computer programs
    6·2 answers
  • What percentage of jobs work in the entertainment industry?
    13·1 answer
  • A vertical curve means that any change in the Aggregate Price Level will have what result?
    15·1 answer
  • What happens when a magnet is close to a iron nail?
    12·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • If we ignore the audio data in a video file, a video file is just a collection of many individual frames (i.e., images). What is
    6·1 answer
  • Describe from an administrator perspective what is necessary to prepare a storage device for access by a user.
    14·1 answer
  • What is a web browser​
    9·1 answer
  • Write an algorithm to print the odd number from 100 to 1​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!