1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
12

What task do the referential integrity settings prevent?

Computers and Technology
2 answers:
Gnom [1K]3 years ago
7 0

Answer:

It is D

Explanation:

It is right on edge.

Cerrena [4.2K]3 years ago
5 0

Answer:

D

Explanation:

You might be interested in
If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
Juliette [100K]

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

8 0
2 years ago
Read 2 more answers
Why would businesses apply cell protection to spreadsheet entries? Provide one specific example.
docker41 [41]

Answer:

To protect a formula

Explanation:

One common example to apply cell protection to spreadsheet entries is to protect a formula used in the sheet to calculate payouts or rankings for example.   A manager might want to share the results of the team to all its team and provides some ranking or other form of calculations in the sheet.  He then needs to protect the formula so it's not altered by the team members or anyone else reviewing the file.

6 0
3 years ago
Which type of address is the ip address 232. 111. 255. 250?.
Nitella [24]

Answer:

It is either an internal IP address or it is a private IP address.

Explanation:

6 0
2 years ago
You are working with an older relative who is writing their last will and testament and you two are sharing the document back an
zloy xaker [14]

Answer:

In word there is a setting where you can mange all of user's permission in the document. These are a few permission settings: Read only and Can edit.

6 0
3 years ago
Acess labeling windows​
Debora [2.8K]

Answer:

I got the same thing

Explanation:

8 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • when seeking information on the on the internet about a variety of subjects the most useful place to look would be?
    13·1 answer
  • What is your understanding of the difference between a stream cipher and a block cipher?
    14·1 answer
  • Without entering into the internet cloud or intranet cloud, how many icons in the topology represent endpoint devices (only one
    6·1 answer
  • Concept about borderless classroom because of technology​
    9·1 answer
  • Which type of film would typically require the least amount of input from a screenwriter?
    10·1 answer
  • Hello help me with this please if you want to thank you I would give brainlist!
    13·2 answers
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
  • Plsssssssss help me​
    8·1 answer
  • Look for at least ten materials tools or anything you see at home (tle)
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!