Social Security Number and Employee ID are candidate keys for a table. An organization chooses Employee ID as the primary key. Social Security Number is considered an alternate key.
Answer the following statement true (T) or false (F)
True
Computer Science & Information Technology
You might also like to view...
Which of these is considered volatile storage?
a. SSD b. ROM c. RAM d. thumb drive
Computer Science & Information Technology
Net.TCP Port ____ permits several network applications to share incoming communications via one TCP port.
A. Manager B. Protocol C. Locking D. Sharing
Computer Science & Information Technology
What security term describes a program written to collect information and store it on the hard drive?
A) Virus B) Intrusion detection and alerts C) Cookie D) Authentication
Computer Science & Information Technology
The virus that infected Iranian nuclear facilities was exploiting vulnerability in SCADA systems
a. MyDoom b. Stuxnet c. Persian d. None of the above
Computer Science & Information Technology