A primary key:
a. Is required for all types of files.
b. Should be unique.
c. Is used in conjunction with a secondary key and is less important than the secondary key.
d. Is the only field used to sort the records of a file.
b. Should be unique.
You might also like to view...
________ is a program that gathers information about your surfing habits without your knowledge
A) Spyware B) Shareware C) Ghostware D) Adware
What is the propagation behavior known as multipath?
What will be an ideal response?
What is a field?
A) A complete set of data for an entity B) An individual piece of data, such as an address C) Indicates where data starts on a new worksheet D) All data about one specific item
Unsolicited e-mail messages are known as ____________________ or junk mail.
Fill in the blank(s) with the appropriate word(s).