1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sammy [17]
3 years ago
15

Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the a

ctions are listed below. Match the violation with the corrective action Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once.
a. Sets invalid foreign keys to a default primary key value, specified in SQL
b. Propagates primary key changes to foreign keys
c. Rejects an insert, update, or delete
d. Sets invalid foreign keys to NULL
1. Restrict
2. Set Null
3. Set Default
4. Cascade
Computers and Technology
1 answer:
Paraphin [41]3 years ago
6 0

Answer:

Follows are the matching to this question:

Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

You might be interested in
When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a messa
mr_godi [17]

Answer:

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

Explanation:

Playfair cipher  invented in 1854 by Charles Wheatstone was the first practical digraph substitution cipher. Lord Playfair promoted the use of the cipher, therefore it was named after him. Playfair cipher encrypts pairs of letters (digraphs) making it hard to break.  Frequency analysis can still be undertaken but requires much more cipher text in order to work. It requires no additional equipment to operate and is very fast therefore it is to protect information during war. It was used  by British forces in the Second Boer War and in World War I and during World War II by the Australians.  

When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in the morning of the 2 of August 1943  in Playfair code:

KXJEY  UREBE  ZWEHE  WRYTU  HEYFS  

KREHE  GOYFI  WTTTU  OLKSY  CAJPO  

BOTEI  ZONTX  BYBWT  GONEY  CUZWR  

GDSON  SXBOU  YWRHE  BAAHY  USEDQ

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

5 0
3 years ago
A computer science student often uses public forum sites like CodeGuru, DreamInCode and StackOverflow in order to help with lear
il63 [147K]

Answer:

C

Explanation:

You can automatically cross out A, as they do not hinder communication. B can be crossed out as well, since kids should use these websites for help. Using the websites can be beneficial and give a learning edge. D is kind of correct, but isn't the best answer.

C is the answer because the websites are public data. People get on the website for help with certain concepts, and helps identify problems to their solution. <em>(Public data found on these forums provides widespread access to identified problems and their solutions. )</em>

4 0
3 years ago
Jenny is working on a laptop computer and has noticed that the computer is not running very fast. She looks and realizes that th
Ulleksa [173]

Answer:

1. She Should Order C. SO-DIMM DDR 3

2. a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.

Explanation:

8 0
3 years ago
There is a file "IT4983" in my home (personal) directory. I don’t know my current working directory. How can I find out the file
RoseWind [281]

Answer and Explanation:

Find / -name "IT4983"

See what it will do is it will find the file named IT4983 in the root directory.

run this commmand with sudo just in case for permission issues.

then it will give you the location of that file we want to find.

 

Or

$ file /home/IT4983 ( you can type this command from whichever directory you are )

output : IT4983 , ASCII TEXT

3 0
3 years ago
What is mouse and how many types of mouse are there​
bekas [8.4K]

Answer:

a mouse is the object that controls the cursor on your computer/laptop, there's one standard type of mouse, but there are thousands of makes and models.

Explanation:

3 0
3 years ago
Other questions:
  • Explain in details the evolution of computers​
    14·1 answer
  • Please what's the answer to this
    14·1 answer
  • On the pie chart below, which “slice” represents 30% of the budget?
    8·1 answer
  • To enable a compute or device that does not have built-in networking capability, use a(n) ______.
    13·1 answer
  • If a business industry does not meet OSHA standards
    9·2 answers
  • I NEED IT NOWW
    13·2 answers
  • 12) If the image's name is filename.gif, how can I make this image the background of my page?
    6·1 answer
  • Give four examples of devices which are both<br>Input and Output to a Computer.​
    12·1 answer
  • You want to copy data from one cell or range to an adjacent cell or range in your spreadsheet, without using a shortcut key. Whi
    10·1 answer
  • Engineers are problem-solvers who use math, science, creativity and other knowledge and skills to solve problems. They use every
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!