The relationship in the accompanying figure was created by clicking the ____________________ check box in the Edit Relationships dialog box.

Fill in the blank(s) with the appropriate word(s).


Enforce Referential Integrity

Computer Science & Information Technology

You might also like to view...

____________ involves using a base-class variable to invoke methods on base-class and derived- class objects, enabling you to “program in the general.”

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Bob Smith is suspected of using his company’s Internet facilities as a conduit for sending large quantities of SPAM to millions of users. You are called in to examine his computer to see if there is evidence to support this claim. This is initially a form of what type of investigation?

a. Civil b. Internal c. Criminal d. This is not something you would do.

Computer Science & Information Technology

____________________ combines contiguous network addresses by stealing bits from the network portion and using them to create a single, larger contiguous address space for host addresses.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The axis that displays numeric data is the ________ axis

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology