1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
15

Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a

ctions are listed below. Match the violation with the corrective action Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once.
a. Sets invalid foreign keys to a default primary key value, specified in SQL
b. Propagates primary key changes to foreign keys
c. Rejects an insert, update, or delete
d. Sets invalid foreign keys to NULL
1. Restrict
2. Set Null
3. Set Default
4. Cascade
Computers and Technology
1 answer:
Paraphin [41]3 years ago
6 0

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

You might be interested in
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
AnnyKZ [126]
You have a raspberry pi connected to all the sensors and a code running to  trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
5 0
3 years ago
Research and describe a recent development in theater and film lighting and explain how the technology can be used. (Maybe limit
Hunter-Best [27]

Answer:

A computerized light dimmer is one helpful development in lighting equipment. Computerized light dimmers help to control the brightness of light. These dimmers lower or increase the intensity of light. I first noticed light dimmers in a scene from the movie Children of Men. In a war scene, innocent people are shown running helter-skelter to save their lives. Artificial lights are used in scene to create that dark appearance in broad daylight, which makes the scene look gloomy and scary. It helped to generate the feeling of uncertainty and suspense through the proper use of lights. Light dimmers help light designers to create the exact atmosphere that the director demands for a scene. Also, because of dimmers, a light designer need not use extra accessories to diffuse light or make the scene brighter.

Explanation:

This is Plato's sample answer so take pieces out.

6 0
3 years ago
Read 2 more answers
What software is my teacher using to do this and how can i stop her from doing this
aliina [53]

Answer:

I’m not sure if you can only teachers can acess that

Explanation:

7 0
3 years ago
Read 2 more answers
History of computer from difference engine <br>​
harkovskaia [24]

Answer:

Charles Babbage (1791-1871), computer pioneer, designed two classes of engine, Difference Engines, and Analytical Engines. Difference engines are so called because of the mathematical principle on which they are based, namely, the method of finite differences.

Explanation:

4 0
2 years ago
Read 2 more answers
Which command displays a text file, one page at a time? question 17 options:?
maks197457 [2]
The command is more.

hope this helps.
6 0
4 years ago
Other questions:
  • In the borders and shading dialog box where would you look to see if your border will have two sides
    11·2 answers
  • ________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas.
    8·1 answer
  • How do keystroke dynamics determine whether to authenticate an individual or not?
    14·1 answer
  • How is a cell named in microsoft excel 2016
    10·1 answer
  • Why did it take fewer 1-inch tiles than 1-centimeter tiles to measure the length of the cookie cutter?​
    9·1 answer
  • What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
    13·1 answer
  • What determines WiFi speeds, please list all your answers and explain how it affects the WiFi speed.
    8·1 answer
  • In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used t
    11·1 answer
  • Write a program that displays the middle value of three unduplicated input values. Hint: Review the four solutions in the smalle
    10·1 answer
  • Please help me on this it’s due now
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!