Respuesta :
Answer:
a) true
Explanation:
In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.
Basically, there are four (4) types of integrity constraints and these are;
1. Key constraints.
2. Domain constraints.
3. Entity integrity constraints.
4. Referential integrity constraints.
Referential integrity is a property of data which states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.
For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.
Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.
Hence, referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.
This ultimately implies that, referential Integrity are rules used in database management systems (DBMS) to ensure relationships between tables when records are changed is VALID (INSERT and UPDATE).
In a nutshell, it always ensures a primary key must have a matching foreign key or it becomes null.
In this exercise we have to analyze the integrity that some constraints have, so the alternative that best matches is;
True
In Computer plan out, uprightness constraints maybe delineate as a set of standard rules that guarantee kind information and collection of data happen uphold. Basically, skilled are four (4) types of completeness restraint and these exist;
- Key constraints.
- Domain constraints.
- Entity integrity constraints.
- Referential integrity constraints.
Referential honor exist a property of information in visible form that states that each irrelevant key value must equal a basic key profit in another family connection or the from another country key profit must be ineffectual.
For instance, when a experience transfer data from one computer system to another Table A points to the basic key of Table B, in accordance with the referential purity restraint, all the worth of the from another country transfer data from one computer system to another Table A must exist valueless or counterpart the basic transfer data from one computer system to another Table B.
Hence, the referential Integrity restraint make secure that the relationship middle from two points the information in visible form in a table exist compatible and right. Hence, referential integrity restraint exist concerned with restrain INSERT and UPDATE movement that influence the parent very young person connection.
This eventually indicate that, referential Integrity are rules secondhand fashionable collection of data management structure (DBMS) to make secure friendship middle from two points tables when records are transformed exist VALID (INSERT and UPDATE). In a nutshell, it forever ensures a basic key must bear a equal foreign key or it enhance ineffectual.
See more about integrity at brainly.com/question/14406733