Describe a primary key, candidate key, secondary key, foreign key, and a combination key. Use your imagination to provide an example of each key that is not in the textbook.
What will be an ideal response?
A primary key is the field or combination of fields that uniquely and minimally identifies a single member of an entity. A candidate key is a field or combination of fields that could serve as a primary key; only one of the candidate keys can be designated as the primary key. A secondary key is a field or combination of fields that serves as a basis for some type of retrieval or processing. A foreign key is a field or combination of fields whose value must match a primary key value in some other table or file.
Students should be able to suggest any number of “keys” from their personal experience. This might be a good team task, with a competitive element thrown in.
You might also like to view...
A realtor would use __________ when she accesses a mobile system to obtain the latest literature on a new house while waiting for the family that she will pitch the house to.
Fill in the blank(s) with the appropriate word.
_____ is often conducted by phone with a hacker imitating someone in a position of authority and attempting to gradually draw information out of a user.
a. Dumpster diving b. Cyberterrorism c. Social engineering attack d. Organizational identity theft
Define what encryption software means.
What will be an ideal response?
Which of the following will correctly create a graphical button that displays "Contact Us" on the button?
A) B) C) D)