1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
5

a rule that states each foreign key value must match a primary key value in the other relation is called the

Computers and Technology
1 answer:
makvit [3.9K]3 years ago
3 0

Answer:

Referencial Integrity Contraint

Explanation:

The referential integrity constraint states that the customer ID i.e (CustID) in the Order table must match a valid CustID in the Customer table. Most relational databases have declarative referential integrity. That is to say, when the tables are created the referential integrity constraints are set up so as to maintain the quality of information.

You might be interested in
How does an agile team obtain clarity on backing items that may be picked up in upcoming iterations? (1 correct answer)
Vinvika [58]

Answer:

The correct answer to the following question will be "Option 4".

Explanation:

Group seems to have a backlog optimization conversation with either the company owner after each iteration to obtain insight about the backlog things to have been collected in the future iterations or executions.

  • Without the need to get feedback on the backlog or pending things in preparation for potential implementations.
  • The next phase brings the dedicated backlog to completion. Iteration targets are calculated, based on dedicated research.
8 0
4 years ago
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
4 years ago
What does an animation sequence action do?
OlgaM077 [116]

B) Plays an object's animation

An animation is a single drawing, cartoon, sketch, etc., but a sequence of animations can create movement, which appears to the viewer as the object or subject in motion.

3 0
3 years ago
Read 2 more answers
The union of two bags is a new bag containing the combined contents of the original two bags. Design and specify a method union
irga5000 [103]

Omg does your fingers hurt?????! Are u okay?? Cause u typed a lot you could have just pictured it. Poor thing

3 0
3 years ago
Which year was the Apple 2 released? <br>A) 1979 <br>B). 1973 <br>C). 1980 <br>D). 1977​
sesenic [268]

Answer:

1977

Explanation:

Apple 2 was released in April 19th 1977

6 0
3 years ago
Read 2 more answers
Other questions:
  • Question 1:
    15·1 answer
  • The wires that transfer data across the motherboard are known as the
    9·1 answer
  • Anna is looking for a job. Which two types of skills would she find necessary to secure a job?
    10·1 answer
  • What are 3 websites that talk about density of different gases, density in air, behavior of different gases of earth, convection
    13·1 answer
  • The instructions for the OS provided by application software
    14·2 answers
  • 3. The channel bit error rate is 0.00001, and each packet’s total length is 1024 bytes including all overheads. Assume there are
    12·2 answers
  • Which of the following is the most appropriate unit to describe the rate at which data is transferred using the internet?
    6·2 answers
  • Based on the following passage on construction technology during the Middle Ages, why might a worker not be allowed to join a gu
    15·1 answer
  • Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swing
    13·1 answer
  • What is difference between reserved and user defined word
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!