1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
2 years ago
5

1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee

n each table. How are relationships made between tables?
Computers and Technology
1 answer:
Alik [6]2 years ago
6 0

Answer:

In your table create statement, you can reference a primary key of another table. This is called a foreign key.

The syntax varies per database type.

You might be interested in
List out the storage measurements units of a computer .<br><br>​
xxTIMURxx [149]

Answer:

Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information. 1 MB is 1,024 kilobytes, or 1,048,576 (1024x1024) bytes, not one million byte

3 0
3 years ago
Read 2 more answers
Page No.:
CaHeK987 [17]

Answer:

The difference is that a floppy relies on a floppy disk reader to spin its disk, where as a hard drive is a fully enclosed container that has it's reader enclosed as well. A floppy disk is a single plastic film disk, where as a hard disk can have multiple metal disks.

Explanation:

7 0
3 years ago
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Keith would like to compare data he has collected from research. The data includes the electrical output
liberstina [14]

Answer: my test says line graph soooo….

Explanation: if its what the test says

4 0
2 years ago
As a member of the accounting group,
Anastasy [175]

Answer:

rtg

Explanation:

rth

3 0
3 years ago
Other questions:
  • A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments
    11·1 answer
  • How many times do you usually use npm?<br> Put your answer in the box.
    6·1 answer
  • Which is an advantage that electronic scheduling tools have over paper calendars?
    13·2 answers
  • Memory cache is referred to as ______. A. SRAM c. SROM b. DRAM d. DROM
    11·1 answer
  • What does the FixedUpdate loop do? Why do developers use it?
    14·1 answer
  • Which of these is an example of rebranding ?
    6·2 answers
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • Could someone please help?​
    10·1 answer
  • Computers rarely make mistakes. True or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!