What content displays in full on the screen?
A) Attached B) Scanned C) Inserted D) Copied
C
Computer Science & Information Technology
You might also like to view...
Calculating the range, variance, and standard deviation of a data set are all methods used to determine the ________ of a data set
A) concentration B) dispersion C) standard deviation D) central tendency
Computer Science & Information Technology
Consider the EMPLOYEE table’s constraint EMPSUPERFK as specified in Figure 4.2 is changed to read as follows:
CONSTRAINT EMPSUPERFK FOREIGN KEY (SUPERSSN) REFERNCES EMPLOYEE(SSN) ON DELETE CASCADE ON UPDATE CASCADE, Answer the following questions: a. What happens when the following command is run on the database state shown in Figure 5.6? DELETE EMPLOYEE WHERE LNAME = ‘Borg’ b. Is it better to CASCADE or SET NULL in case of EMPSUPERFK constraint ON DELETE?
Computer Science & Information Technology