A foreign key should have the same or comparable _________ as its related primary key.

a. string length
b. data type
c. name
d. column order


b. data type

Computer Science & Information Technology

You might also like to view...

Peer-to-peer systems typically depend on untrusted and volatile computer systems for most of their resources. Trust is a social phenomenon with technical consequences. Volatility (i.e. unpredicatable availability) also is often due to human actions. Elaborate your answers by discussing the possible ways in which each of them is likely to differ according to the following attributes of the computers used:

i) ownership ii) geographic location iii) network connectivity iv)country or legal jurisdiction What does this suggest about policies for the placement of data objects in a peer-to-peer storage service?

Computer Science & Information Technology

Why is it dangerous to substitute fonts in a document—even if their names are identical?

What will be an ideal response?

Computer Science & Information Technology

Write code that prints the values stored in an array called names backwards.

What will be an ideal response?

Computer Science & Information Technology

When merging and comparing presentations, when does the Revisions pane open?

A) As soon as you click the Review tab B) After you click Merge on the Review tab C) After you click Compare on the Review tab D) Immediately after you open the original presentation

Computer Science & Information Technology