The most common type of relationship between two tables is the ________ relationship
A) one-to-one
B) one-to-many
C) many-to-many
D) referential integrity
B
You might also like to view...
Which of the following statements is true?
a. Strings can be used in a switch statement’s controlling expression and in its case labels. b. Strings can be used in a switch statement’s controlling expression but not in its case labels. c. Strings cannot be used in a switch statement’s controlling expression but can be used in its case labels. d. Strings cannot be used in a switch statement’s controlling expression and cannot be used in its case labels.
An e-mail-based scam that's designed to persuade you to reveal confidential information is called ____.
A. surfing B. phishing C. scanning D. searching
A function is invoked with a(n) _________.
Fill in the blank(s) with the appropriate word(s).
________ indicates the maximum length of a data field
A) Input mask B) Format C) Field size D) Validation Rule