| 1. | It supports all combinations of UML multiplicity and enforces referential integrity.
|
| 2. | Referential integrity is enforced via cascading updates and deletes.
|
| 3. | Tools can enforce referential integrity and perform static checks of the final system before deployment.
|
| 4. | Which method is used may be determined by a referential integrity constraint defined in a data dictionary.
|
| 5. | The software supports referential integrity, multi-master replication, and has a modular authentication architecture.
|
| 6. | Hand-over can be for a part of all data, whilst maintaining full referential integrity.
|
| 7. | This subschema is standard-relational, with features such as constraints and referential integrity being used to the hilt.
|
| 8. | Model-to-model consistency concerns the referential integrity as well as high-level constraints of the system.
|
| 9. | An "'XML schema "'is a description of a type of uniqueness and referential integrity constraints.
|
| 10. | The application model defines entities ( tables ), fields, keys ( indexes ) and relationships together with referential integrity.
|