The purpose of a primary key is to ensure:

A) Record Repetition. B) Field Designation.
C) Organization Management. D) Entity Integrity.


D

Computer Science & Information Technology

You might also like to view...

Which of the following terms are used to describe defining a class so that the implementation of the member functions is either not known or at least is irrelevant to its use

a) walling up b) encapsulation c) abstraction d) Caging up the data and functions e) Information hiding

Computer Science & Information Technology

Access lists can take the place of more advanced security measures, such as firewalls.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The cornerstone of incident response is the incident response team-usually one or more trained, preassigned ____________________ with policies in place for what to do.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ____ contains an embedded computer chip to manage payments and deposits.?

A. ?token B. ?smart card C. ?fare collector D. ?ticket

Computer Science & Information Technology