Two fields needed to uniquely identify a record are called a ________ key
A) composite
B) natural primary
C) foreign
D) primary
A
Computer Science & Information Technology
You might also like to view...
A form of fraud is buying an item and not paying for it
Indicate whether the statement is true or false
Computer Science & Information Technology
Due to the many limitations, PPP, the Point-to-Point Protocol has been replaced by use of SLIP.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The result of fib(4) is 8.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Different versions of Linux are known as distros
Indicate whether the statement is true or false
Computer Science & Information Technology