What is the relationship between a primary key and its corresponding foreign keys?

a. One-to-one.
b. Many-to-one.
c. Many-to-many.
d. One-to-many.


d. One-to-many.

Computer Science & Information Technology

You might also like to view...

________ mark specific locations on a line of text in a document

A) Placeholders B) Leader lines C) Anchors D) Tab stops

Computer Science & Information Technology

What type of backlighting receives DC power directly from a motherboard and doesn't use an inverter?

A. CCFL B. LED C. Plasma D. OLED

Computer Science & Information Technology

A good way to share files with others is to use a(n) ________, or online, storage service.

A. flash drive B. external drive C. virtual storage D. cloud storage

Computer Science & Information Technology

Which of the following BEST describes a software vulnerability that is actively being used by Sara and Jane, attackers, before the vendor releases a protective patch or update?

A. Buffer overflow B. IV attack C. Zero day attack D. LDAP injection

Computer Science & Information Technology