What are two types of constraints? Give two examples of each.

What will be an ideal response?


The constraints are used in Oracle to enforce rules. The two types of constraints are:
Integrity constraints – PRIMARY KEY and FOREIGN KEY constraints
Value constraints – NOT NULL, CHECK and UNIQUE constraints

Computer Science & Information Technology

You might also like to view...

How is the Autogrowth setting used on data files and log files and what is a best practice for this setting?

What will be an ideal response?

Computer Science & Information Technology

A temporary storage area in your computer's memory for copied or cut items is known as the Windows _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

__________ uses 128-bit addresses to uniquely identify devices connected to the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following controls can be implemented together to prevent data loss in the event of theft of a mobile device storing sensitive information?

A. Full device encryption B. Screen locks C. GPS D. Asset tracking E. Inventory control

Computer Science & Information Technology