Two fields needed to uniquely identify a record are called a ________ key

A) composite
B) natural primary
C) foreign
D) primary


A

Computer Science & Information Technology

You might also like to view...

A form of fraud is buying an item and not paying for it

Indicate whether the statement is true or false

Computer Science & Information Technology

Due to the many limitations, PPP, the Point-to-Point Protocol has been replaced by use of SLIP.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The result of fib(4) is 8.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Different versions of Linux are known as distros

Indicate whether the statement is true or false

Computer Science & Information Technology