1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
2 years ago
12

Why do relational databases use primary keys and foreign keys?.

Computers and Technology
1 answer:
Andrew [12]2 years ago
8 0

Answer:

Explanation:

A relational database is designed to enforce the uniqueness of primary keys by allowing only one row with a given primary key value in a table. A foreign key is a column or a set of columns in a table whose values correspond to the values of the primary key in another table.

You might be interested in
String member function compare compares two strings (or substrings) and returns 0 if:
Margarita [4]

Answer:

The correct answer for the given question is option(B). i.e the strings are equal.

Explanation:

String are the collection of characters.In the string compare function if both string are equal then it return 0 value otherwise it return non zero value.

if string 1 is greater then the string 2 then it return 1 . in c language

if string 2 is greater then string 1 then it return -1 in c language.

6 0
3 years ago
To include all fields in a sql query, use the ____ symbol after the word select.
dolphi86 [110]
SQL is a standard language for storing, manipulating and retrieving data in databases and t<span>he SELECT statement is used to select data from a database.</span>
To include all fields in a SQL query, use the * symbol after the word select. The symbol * is used after the word SELECT. This way it indicates that you want to include all fields in the query results in the order in which you described them to the DBMS when you created the table.​
4 0
4 years ago
Two electronics technicians are looking at the representations of a silver atom and a copper atom in the figure above. Technicia
eduard
C is your correct answer.
5 0
4 years ago
Which of the following statements is true?
nexus9112 [7]
Gray hat hacker work at a more advanced level then white and black hat hackers
3 0
3 years ago
Read 2 more answers
Does any body know the name of this sensor? ​
kipiarov [429]

Answer:

ummm it looks like a fingerprint sensor

Explanation:

here a similar pic to it .i hope this helps :)

5 0
3 years ago
Other questions:
  • Protected base class members cannot be accessed by: a.friends of the base class.
    6·1 answer
  • The steps for moving data from one cell to another are _____.
    14·1 answer
  • g c 24-hour time (also known in the U.S. as military time) is widely used around the world. Time is expressed as hours since mid
    7·1 answer
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • What is an internt?​
    10·1 answer
  • In a _______ format, the date line and the signature block are centered.
    6·1 answer
  • Explain Text align , Text Decoration, colour, Text shadow..​
    11·1 answer
  • Peer collaboration helps develop critical-thinking skills, which is the ability to
    9·2 answers
  • SHORT ANSWERS:
    7·1 answer
  • How to write a C++ program that lets the user guess if a randomly generated integer is even or odd then the computer lets them k
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!