Which of the following is used to uniquely identify records in a table?

(A) a Rule of Referential Integrity
(B) a foreign key
(C) a primary key
(D) a relational database


(C) a primary key

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Check boxes may be grouped in a ButtonGroup, like radio buttons are. 2. All operating systems offer the same set of GUI components. 3. The System.exit method will end the application. 4.The ActionEvent argument that is passed to an action listener's actionPerformed method is the event object that was generated in response to an event.

Computer Science & Information Technology

If evidence is collected against a suspect in a criminal case and it is found to have been collected in violation of the suspect's Constitutional rights, that evidence will be disallowed under the ____________________.

a. Fourth Amendment b. Bill of Rights c. Witness Protection Act d. Exclusionary Rule

Computer Science & Information Technology

In a Microsoft domain using Kerberos authentication, after a client has been authenticated and received a TGT, the client presents this to a Ticket-Granting Service to receive something that allows authorization to resources for up to 8 hours. What is a common name for this last item?

A. timestamp B. password C. token D. smart card

Computer Science & Information Technology

_______ is responsible for creating and monitoring lab policies for staff, and provides a safe and secure workplace for staff and evidence.?

A. ?The lab manager B. ?The lab investigator C. ?The lab secretary D. ?The lab steward

Computer Science & Information Technology