MC The foreign key helps maintain the_________ .

a) Rule of Entry Integrity.
b) Rule of Referential Integrity.
c) Rule of Data Integrity.
d) None of the above.


b) Rule of Referential Integrity.

Computer Science & Information Technology

You might also like to view...

Match the following commands with their purposes:

I. Run II. Datasheet View III. Query Wizard IV. Query Design V. Find Unmatched Query Wizard A. Used to preview how an action would affect data. B. Provides step-by-step instructions for creating one specific type of action query. C. Performs the action of the query. D. Allows for the creation of a simple select query. E. Allows the creation of certain action queries not available anywhere else.

Computer Science & Information Technology

In PowerPoint, a video clip can be trimmed anywhere in the clip.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Word, by default, places a tab stop at every ____ mark on the ruler.

A. .25" B. .5" C. .75" D. 1"

Computer Science & Information Technology

A system administrator is tasked to enable authentication on a web server's login page. One of the requirements for the web server is to encrypt authenticated sessions over HTTP protocol for all static HTML pages. Using the information supplied, which of the following default port numbers should be used to satisfy these requirements?

A. 53 B. 8080 C. 143 D. 443

Computer Science & Information Technology