The ________ key in one table acts as a primary key of another table
A) numeric B) composite C) natural D) foreign
D
Computer Science & Information Technology
You might also like to view...
Each ________ includes background colors, font styles, colors, effects, and slide layouts
Fill in the blank(s) with correct word
Computer Science & Information Technology
An attacker types more data in a field than the programmer expected. This is a(n) ________ attack
A. buffer overflow B. denial-of-service C. directory traversal D. XSS
Computer Science & Information Technology