When referential integrity is enforced, you cannot enter a(n) ________ key in a related table unless the primary key exists in the primary table
Fill in the blank(s) with correct word
foreign
Computer Science & Information Technology
You might also like to view...
The ________ tab type will center text around the tab stop
Fill in the blank(s) with correct word
Computer Science & Information Technology
Programmers commonly use a technique known as ____________ to divide an algorithm into smaller parts, which are then implemented as methods.
a. flow charting b. top-down design c. modular prototyping d. sub task recognition
Computer Science & Information Technology