When referential integrity is enforced, you cannot enter a(n) ________ key in a related table unless the primary key exists in the primary table

Fill in the blank(s) with correct word

foreign

Computer Science & Information Technology

You might also like to view...

The ________ tab type will center text around the tab stop

Fill in the blank(s) with correct word

Computer Science & Information Technology

Programmers commonly use a technique known as ____________ to divide an algorithm into smaller parts, which are then implemented as methods.

a. flow charting b. top-down design c. modular prototyping d. sub task recognition

Computer Science & Information Technology