1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
13

You have just finished entering field names for your database . You need to choose the primary key or key field but none of your

fields are unique. What should you do ?
A. Save the database without a key field
B. Use one of the existing fields even if it is not unique
C. Let the database assign a unique number in a new field
D. Use a spreadsheet instead
Computers and Technology
2 answers:
levacccp [35]3 years ago
6 0

Answer:

Option C is the correct answer to the following question.

Explanation:

In the following option is true because when once the entering of the fields name is done and you didn't choose any of the fields as primary but you want to choose field as primary and you also not choose any field as unique then, you should do one thing, you have to assign a unique number in your database in a new field.

Luden [163]3 years ago
3 0

C. Let the database assign a unique number in a new field

You might be interested in
Which code snippet is the correct way to rewrite this in Semantic HTML?
xxMikexx [17]

Answer:

<div id="header">

<h1>Waketech</h1>

</div>

<header><h1>Waketech</h1></header>

Explanation:

I think thats the answer your welcome

8 0
1 year ago
What can u access various sites on
Klio2033 [76]
Search engines. (I'm Misty btw if you want to know)
3 0
3 years ago
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
4 years ago
Read 2 more answers
Write 5 chart types​
Lemur [1.5K]

Answer:

pie chart

line chart

area chart

bar charts

histogram

scatter plot

6 0
3 years ago
You need to install a 32-bit application on a 32-bit version of windows 10. In which default directory will the application be i
luda_lava [24]

Answer:

%systemdrive%\Program Files

7 0
2 years ago
Other questions:
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • Conceptual note-taking is the act of
    15·1 answer
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
    8·1 answer
  • True or false? Colons are required when entering the MAC address into the Reservation window?
    14·1 answer
  • How do you debug an Xcode project?
    10·1 answer
  • Hannah decides to burn her video portfolio to a DVD. She wants to hand it over to a movie producer she will meet at a social eve
    15·1 answer
  • What is the plan to make optimum usage of available spaces?
    15·1 answer
  • What are the benefits and risks of a client-server network?
    5·1 answer
  • Any one know :) please
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!