Sign In
Ask Question
Laney House
Computers & Technology
21 March, 03:12
Briefly discuss constraints
+5
Answers (
1
)
Nathanael Ashley
21 March, 03:16
0
Constraint is defined as a part of individual attribute or column. In terms of computer programming, constraints relation are stated in the form of variable. Basically, constraint is the rule that are use for optimization purpose.
There are different types of constraints that are:
Primary key constraint : It is defined as, the combination of columns which uniquely identify each data in the database table. Unique constraint : Unique constraint are used to ensure that all the values in the column table in the database are must be different. Not null constraint : It basically prevent all the null values from entering into one or more than one column in a table.
Comment
Complaint
Link
Know the Answer?
Answer
Not Sure About the Answer?
Find an answer to your question 👍
“Briefly discuss constraints ...”
in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers
You Might be Interested in
In a social networking site your personal information is listed under your?
Answers (2)
In 2-3 sentences, describe a case where circuit-switching is better than packet-switching?
Answers (1)
A website requires their users to create a password for their own account using numbers from 0-5, inclusive, non-repeatedly. The password has to be at least 5-digit long, then how many possible ways are there for them to create their passwords?
Answers (1)
Which Windows feature automatically adjusts the display and input methods depending on the form factor being used and whether a hardware keyboard is active?
Answers (1)
What kind of software would you use to view and troubleshoot protocol-specific problems such as TCP retries caused by missed acknowledgements, or duplicate acknowledgements that cause network slow-down?
Answers (1)
New Questions in Computers & Technology
The is a federal law that provides a definition of the term cyberterrorism and under which young people primarily involved in what they consider to be minor computer pranks have been tried as cyberterrorists.
Answers (1)
Which tool is best used to test an electrical current for a power source? Cable tester Loopback plug Multimeter Tone generator and probe
Answers (1)
Kylie has created some code designed to keep track of information about employees at a company. The code will be used by the company to create a database of personal information (like home address, phone humber, email address, etc.
Answers (1)
Show a single view of an object, but show it in a way that makes it look 3-D, as your eye would see it.
Answers (1)
What network setting do i need for a workgroup?
Answers (1)
Home
»
Computers & Technology
» Briefly discuss constraints
Sign In
Sign Up
Forgot Password?