To ensure the uniqueness of values in a non-primary key column, you can create a unique index by using the ____________________ command.

Fill in the blank(s) with the appropriate word(s).


CREATE UNIQUE INDEX

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. The throw statement is used to throw an exception. b. The throw statement is used to specify that a method will throw an exception. c. The throw statement is used to access an exception parameter. d. All of the above.

Computer Science & Information Technology

When a method's return type is a class, what is actually returned to the calling program?

a. an object of that class b. a reference to an object of that class c. the values in the object that the method accessed d. nothing - the return type is simply for documentation in this situation

Computer Science & Information Technology

Which kind of memory is volatile because it is temporary in nature?

A. RAM B. ROM C. P3 D. CMOS

Computer Science & Information Technology

A ____ is the instruction that describes the set of operations to be performed on the given input in order to produce the cryptographic output.

A. mode B. transformation C. provider D. control

Computer Science & Information Technology