Candidate keys that are not used for the primary keys are ________ keys

A) artificial
B) natural
C) alternate
D) composite


C

Computer Science & Information Technology

You might also like to view...

Consider a distributed transaction processing system that uses a serial validation optimistic concurrency control at each site and a two-phase commit protocol. Show that deadlocks are possible under these conditions.

What will be an ideal response?

Computer Science & Information Technology

A dataset is a copy of the fields and records the application can access from a database.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How does the 64-bit version of Windows support 32-bit applications?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not part of the three-step auditing process?

A. Enabling auditing for files. B. Turning on and auditing policy. C. Evaluating the system log. D. Reviewing the security log.

Computer Science & Information Technology