What content displays in full on the screen?

A) Attached B) Scanned C) Inserted D) Copied

C

Computer Science & Information Technology

You might also like to view...

Calculating the range, variance, and standard deviation of a data set are all methods used to determine the ________ of a data set

A) concentration B) dispersion C) standard deviation D) central tendency

Computer Science & Information Technology

Consider the EMPLOYEE table’s constraint EMPSUPERFK as specified in Figure 4.2 is changed to read as follows:

CONSTRAINT EMPSUPERFK FOREIGN KEY (SUPERSSN) REFERNCES EMPLOYEE(SSN) ON DELETE CASCADE ON UPDATE CASCADE, Answer the following questions: a. What happens when the following command is run on the database state shown in Figure 5.6? DELETE EMPLOYEE WHERE LNAME = ‘Borg’ b. Is it better to CASCADE or SET NULL in case of EMPSUPERFK constraint ON DELETE?

Computer Science & Information Technology