The purpose of a primary key is to ensure:
A) Record Repetition. B) Field Designation.
C) Organization Management. D) Entity Integrity.
D
You might also like to view...
Which of the following terms are used to describe defining a class so that the implementation of the member functions is either not known or at least is irrelevant to its use
a) walling up b) encapsulation c) abstraction d) Caging up the data and functions e) Information hiding
Access lists can take the place of more advanced security measures, such as firewalls.
Answer the following statement true (T) or false (F)
The cornerstone of incident response is the incident response team-usually one or more trained, preassigned ____________________ with policies in place for what to do.
Fill in the blank(s) with the appropriate word(s).
A(n) ____ contains an embedded computer chip to manage payments and deposits.?
A. ?token B. ?smart card C. ?fare collector D. ?ticket