A primary key from one table that is used to form a relationship with a second table is called a(n) ________
Fill in the blank(s) with correct word
foreign key
Computer Science & Information Technology
You might also like to view...
An application can use the operations of an ADT without knowing how the ADT is implemented.
What will be an ideal response?
Computer Science & Information Technology
Chained exceptions are useful for finding out about ________.
a. exceptions thrown using the chained keyword. b. checked exceptions only. c. an original exception that was caught before the current exception was thrown. d. the current exception’s chain of superclasses.
Computer Science & Information Technology