1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
3 years ago
5

1. You are given a database to create, however, you realize that in the instructions you are told to create relationships betwee

n each table. How are relationships made between tables?
Computers and Technology
1 answer:
Alik [6]3 years ago
6 0

Answer:

In your table create statement, you can reference a primary key of another table. This is called a foreign key.

The syntax varies per database type.

You might be interested in
Situation: You have been asked to compare and contrast the concepts of http:// and file:///. Write a few sentences comparing the
Molodets [167]

Answer:

the file isnt coming up

Explanation:

4 0
3 years ago
What software is my teacher using to do this and how can i stop her from doing this
aliina [53]

Answer:

I’m not sure if you can only teachers can acess that

Explanation:

7 0
3 years ago
Read 2 more answers
In what ways do cameras allow us to see the world in ways that we could not with only our eyes?
Grace [21]
Cams always us to see things that happen when we are not there
6 0
3 years ago
Read 2 more answers
Explain the concept of “survival of the fittest”
klasskru [66]

Answer:

i think thats a line from  the lorax

Explanation:

4 0
3 years ago
Mối quan hệ giữa đối tượng và lớp
Andreas93 [3]

Answer:

please write in english i cannot understand

Explanation:

8 0
3 years ago
Other questions:
  • What medium allows for electronic delivery of DTP content without the need for any physical media?
    13·1 answer
  • The two types of one-time-password tokens are ______ and ______.
    10·2 answers
  • When you use your fingerprint on a reader attached to your computer to authenticate yourself as the legitimate computer user, wh
    6·1 answer
  • The term _______ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring tha
    15·1 answer
  • Type the correct answer in the box. Spell the word correctly. Which framework can be used to develop cross-platform applications
    15·2 answers
  • Does access provide email communication
    13·1 answer
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • What is the correct html element for playing audio files?
    11·1 answer
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers.
    8·1 answer
  • Which type of a computer can be assembled using a monitor, a keyboard, a cpu, speakers, a printer and a mouse?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!