When two fields are needed to uniquely identify a record, a ________ key is used

A) foreign B) numeric C) natural D) composite


D

Computer Science & Information Technology

You might also like to view...

The three typical tiers in a web application are ________, ________ and ________.

a. user interface tier, business logic tier, information tier. b. browser tier, server tier, information tier. c. client tier, middle tier, top tier. d. None of the above.

Computer Science & Information Technology

Which of the following are enhancements of the 802.11n standard?

A. 40 MHz channels and variable guard interval B. 20 MHz channels and fixed guard interval C. bonding of two 10 MHz channels D. operation in the 40 GHz frequency range

Computer Science & Information Technology

Sizing handles display as small, black-filled circles to resize a chart

Indicate whether the statement is true or false

Computer Science & Information Technology

Which action query would you use if you wanted to change every occurrence of "Miss" or "Mrs." to "Ms"?

A. Append B. Change Records C. Find and Replace D. Update

Computer Science & Information Technology