A primary key:

a. Is required for all types of files.
b. Should be unique.
c. Is used in conjunction with a secondary key and is less important than the secondary key.
d. Is the only field used to sort the records of a file.


b. Should be unique.

Computer Science & Information Technology

You might also like to view...

________ is a program that gathers information about your surfing habits without your knowledge

A) Spyware B) Shareware C) Ghostware D) Adware

Computer Science & Information Technology

What is the propagation behavior known as multipath?

What will be an ideal response?

Computer Science & Information Technology

What is a field?

A) A complete set of data for an entity B) An individual piece of data, such as an address C) Indicates where data starts on a new worksheet D) All data about one specific item

Computer Science & Information Technology

Unsolicited e-mail messages are known as ____________________ or junk mail.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology