Social Security Number and Employee ID are candidate keys for a table. An organization chooses Employee ID as the primary key. Social Security Number is considered an alternate key.

Answer the following statement true (T) or false (F)


True

Computer Science & Information Technology

You might also like to view...

Which of these is considered volatile storage?

a. SSD b. ROM c. RAM d. thumb drive

Computer Science & Information Technology

Net.TCP Port ____ permits several network applications to share incoming communications via one TCP port.

A. Manager B. Protocol C. Locking D. Sharing

Computer Science & Information Technology

What security term describes a program written to collect information and store it on the hard drive?

A) Virus B) Intrusion detection and alerts C) Cookie D) Authentication

Computer Science & Information Technology

The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems

a. MyDoom b. Stuxnet c. Persian d. None of the above

Computer Science & Information Technology