1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
10

What is a foreign key and how does it provide referential integrity?

Computers and Technology
1 answer:
Step2247 [10]3 years ago
4 0

Answer:

By definition a foreign key of table A is a primary key of another table B, thereby establishing a link between them.

To provide referential integrity you can use these referential actions:

  • <u>Cascade:</u> If rows in table B are deleted, the matching foreign key columns in table A are deleted.
  • <u>Set Null:</u> If rows in table B are deleted, the matching foreign key columns in table A are set to null.
  • <u>Set Default:</u> If rows in table B are deleted, the matching foreign key columns in table A are set with the default value of the column.
  • <u>Restrict:</u> A value in table B cannot be deleted or updated while as it is referred to by a foreign key in table A.

You might be interested in
A hub is a central computer true or false?
klio [65]

Answer:

hub is central computer.....True...

4 0
2 years ago
Read 2 more answers
You conduct an experiment to find the probability of a flipped coin landing on
AleksAgata [21]

Answer:

Experimental probability describes how frequently an event actually occurred in an experiment. So if you tossed a coin 20 times and got heads 8 times, the experimental probability of getting heads would be 8/20, which is the same as 2/5, or 0.4, or 40%.

5 0
2 years ago
Read 2 more answers
Getting access to web browsing software to install it on a computer or to update your existing software is called _________ .
Ivenika [448]

Answer:

Downloading and/or Burning it on to your computer

Hope this helped! if so please mark it as brainliest

Explanation:

8 0
3 years ago
Read 2 more answers
A server needs to connect directly to the Internet. The ipconfig/all command shows that the server has been auto-assigned the IP
Deffense [45]

Answer:

Link-local address

Explanation:

IP addresses that have "FE80" as the hexadecimal representation of their first 10 bits are IPV6 reserved addresses for link-local unicast addressing. These addresses are automatically configured (though may be manually configured too) on any interface and should not be routed. They are used for addressing on a single link with the main aim, among others, of automatic configuration and routing protocol advertisement. Devices attached to this link can be accessed or reached using the link-local addresses as they don't need a global address to communicate.

However, routers will not forward datagram or packets using link-local addresses. In other words, routers are not allowed to connect to the internet using the unicast link-local addresses.

8 0
3 years ago
Which is an action that an operating system performs? (1 point)
Darya [45]

The  action that an operating system performs is that it facilitates a computer's basic functions between hardware and software.

<h3>What is the purpose of an operating system in a computer?</h3>

An operating system (OS) is known to be a term that is used in computing and it is said to be one which the program, after being started  is said to be loaded into the computer using the boot program.

It is one that helps to handle all of the other application programs in a computer.

The application programs is known to also make use of the operating system and as such, The  action that an operating system performs is that it facilitates a computer's basic functions between hardware and software.

Learn more about operating system from

brainly.com/question/22811693

#SPJ1

8 0
2 years ago
Other questions:
  • Write a recursive method public static String reverse(String str) that computes the reverse of a string. For example, reverse("f
    6·1 answer
  • Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.
    13·1 answer
  • Plagiarism occurs when writers
    14·2 answers
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • Show the stack with all activation record instances, including static and dynamic chains, when execution reaches position 1 in t
    6·1 answer
  • ____________ is a script or a tool that obtains privileges of a root
    8·1 answer
  • Good ways to increase sales on phone accesories?
    10·2 answers
  • Does anyone know what to do when brainly won't let you answer questions? I click on answer question and then it just sits there
    15·2 answers
  • What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.e
    9·1 answer
  • How many passes will it take to find the five in this list?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!