?A combination key can also be called a _____.

A. ?composite key
B. ?concatenated key
C. ?foreign key
D. ?multivalued key


Answer: A. ?composite key, B. ?concatenated key, D. ?multivalued key

Computer Science & Information Technology

You might also like to view...

Given an integer n> 0, write a recursive function countDown that writes the integers n, n – 1, . . . , 1. Hint: What task can you do and what task can you ask a friend to do for you?

What will be an ideal response?

Computer Science & Information Technology

In Java, call-by-value is only used with:

(a) objects (b) primitive types (c) this (d) all of the above

Computer Science & Information Technology

Of the measures of feasibility, questions such as "Does management support the project?" and "Will the new system require training for users?" would help predict a system's _____.?

A. ?schedule feasibility B. ?technical feasibility C. ?economic feasibility D. ?operational feasibility

Computer Science & Information Technology

What is compression?

a. a VPN used to grant outside entities access into a perimeter network; used to hose resources designated as accessible to a limited group of external entities, such as business partners or suppliers, but not the general public b. a subset of asymmetric cryptography based on the use of key pair sets c. the art and science of hiding information from unauthorized third parties d. the removal of redundant or superfluous data or space to reduce the size of a data set

Computer Science & Information Technology