Which term identifies a field that appears in two separate tables and may be used to connect records in the separate tables?
A. primary key field
B. field value
C. foreign key field
D. common field
Answer: D
You might also like to view...
Database systems can greatly reduce the amount of redundancy involved in storing data.Does this imply that database systems may in fact be less reliable than nondatabase systems? Explain your answer.
What will be an ideal response?
Why is prime factorization significant?
a. Because it is computationally difficult b. Because it is difficult to find a prime number c. Because prime numbers are rare d. Because prime numbers are difficult to multiply and divide
Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.
A. worm B. masquerade program C. Trojan horse D. virtual login console
Data breaches lead to:
a. the physical damage of a personal computer. b. the loss of business opportunity. c. the decreasedcustomer support cost for information hotlines. d.the decreased customer support cost for credit monitoring services.