Referential integrity means that for each value in the ________ field of a table, there is a corresponding value in the primary key of the related table

Fill in the blank(s) with correct word


foreign key

Computer Science & Information Technology

You might also like to view...

There are thousands of predefined classes that come with Java.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The token ring network is capable of detecting and troubleshooting certain network faults according to an algorithm that is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which PowerShell cmdlet can be used to start a virtual machine?

A. Open-VM B. Start-VM C. Run-VM D. Exec-VM

Computer Science & Information Technology

DML triggers are used to ________.

maliciously attack databases produce automatic responses if the structure of the database has been altered Both maliciously attack databases and produce automatic responses if the structure of the database has been altered   Neither maliciously attack databases nor produce automatic responses if the structure of the database has been altered

Computer Science & Information Technology