Which of the following is a likely primary key?

A) First name B) Date of birth
C) Last name D) Student ID number


D

Computer Science & Information Technology

You might also like to view...

How can you make a script executable?

What will be an ideal response?

Computer Science & Information Technology

If output is to be frequently accessed, which is the best alternative?

A) audio B) CD ROM C) printer D) display screen or Web

Computer Science & Information Technology

You are performing a business impact analysis (BIA). What is the result that occurs during the identify recovery priorities step?

A. critical asset list B. the criticality levels of all assets C. a recovery hierarchy D. a list of all assets that need to be recovered

Computer Science & Information Technology

What are the security aspects of AOP?

What will be an ideal response?

Computer Science & Information Technology