Which of the following is a likely primary key?
A) First name B) Date of birth
C) Last name D) Student ID number
D
Computer Science & Information Technology
You might also like to view...
How can you make a script executable?
What will be an ideal response?
Computer Science & Information Technology
If output is to be frequently accessed, which is the best alternative?
A) audio B) CD ROM C) printer D) display screen or Web
Computer Science & Information Technology
You are performing a business impact analysis (BIA). What is the result that occurs during the identify recovery priorities step?
A. critical asset list B. the criticality levels of all assets C. a recovery hierarchy D. a list of all assets that need to be recovered
Computer Science & Information Technology
What are the security aspects of AOP?
What will be an ideal response?
Computer Science & Information Technology