The general form for assigning a foreign key is ADD FOREIGN KEY, the column name(s) of the foreign key, the ____ clause, and then the table name that the foreign key must match.

A. WHERE
B. REFERENCES
C. FROM
D. IN


Answer: B

Computer Science & Information Technology

You might also like to view...

The SUM function:

A) displays the lowest value in a range. B) identifies the midpoint value in a set of values. C) calculates the arithmetic mean or average of values in a range. D) calculates the total of values contained in two or more cells.

Computer Science & Information Technology

An interactive game uses ports 26000 to 26050 for connecting to other players. A chat client for this game uses port 56. What security feature would you configure on the firewall so that whenever ports 26000 to 26050 are being used, port 56 is also allowed through the firewall for the same duration of time as the higher numbered ports?

A) Firewall hardening B) Port triggering C) Proxy D) Hidden share

Computer Science & Information Technology

Explain why it is important to protect the passwords of all users, even those with limited permissions on a network.

What will be an ideal response?

Computer Science & Information Technology

TheĀ ISSMP examination is designed to provide CISSPs with a mechanism to demonstrate competence in __________.

A. enterprise security management practices B. security management practices C. business continuity planning and disaster recovery planning D. All of the above

Computer Science & Information Technology