A primary key can consist of ___________ column(s).

a. one or more
b. one
c. two
d. zero


a. one or more

Computer Science & Information Technology

You might also like to view...

Given a list, animal List, that contains the objects: cat, dog, tiger, lion; the function first item from list would return which object?

a. cat b. dog c. tiger d. lion e. None of these

Computer Science & Information Technology

You can use the ____ dialog box to create a new table, edit any of the existing tables, or create a copy of an existing table.

A. Table Properties B. Create Table C. More Tables D. Table Formats

Computer Science & Information Technology

Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?

A. Authenticity B. Nonrepudiation C. Confidentiality D. Integrity

Computer Science & Information Technology

Works come under ____________________ as soon as they are created and presented in a fixed form.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology