The most common type of relationship between two tables is the ________ relationship

A) one-to-one
B) one-to-many
C) many-to-many
D) referential integrity


B

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. Strings can be used in a switch statement’s controlling expression and in its case labels. b. Strings can be used in a switch statement’s controlling expression but not in its case labels. c. Strings cannot be used in a switch statement’s controlling expression but can be used in its case labels. d. Strings cannot be used in a switch statement’s controlling expression and cannot be used in its case labels.

Computer Science & Information Technology

An e-mail-based scam that's designed to persuade you to reveal confidential information is called ____.

A. surfing B. phishing C. scanning D. searching

Computer Science & Information Technology

A function is invoked with a(n) _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ indicates the maximum length of a data field

A) Input mask B) Format C) Field size D) Validation Rule

Computer Science & Information Technology