1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
13

You have just finished entering field names for your database . You need to choose the primary key or key field but none of your

fields are unique. What should you do ?
A. Save the database without a key field
B. Use one of the existing fields even if it is not unique
C. Let the database assign a unique number in a new field
D. Use a spreadsheet instead
Computers and Technology
2 answers:
levacccp [35]3 years ago
6 0

Answer:

Option C is the correct answer to the following question.

Explanation:

In the following option is true because when once the entering of the fields name is done and you didn't choose any of the fields as primary but you want to choose field as primary and you also not choose any field as unique then, you should do one thing, you have to assign a unique number in your database in a new field.

Luden [163]3 years ago
3 0

C. Let the database assign a unique number in a new field

You might be interested in
What is a program file​
Fantom [35]

Answer:

Program Files is the directory name of a standard folder in Microsoft Windows operating systems in which applications that are not part of the operating system are conventionally installed.

Explanation:

7 0
2 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
3 years ago
What kind of software would you use to view and troubleshoot protocol-specific problems such as TCP retries caused by missed ack
sveticcg [70]

Answer:

The kind of software to use is a protocol analyser.

Explanation:

The Protocol analyser, which could either be a hardware or a software is a tool that is used for capturing and analysing signals and also interpreting network traffic over a communication channel or between two or more connected computer systems

Protocol analysers can be used to find out location of problems on Local Area Network by examining flow of traffic.

7 0
3 years ago
If you need to set up direct deposit, which information from your check would you likely need?
natita [175]
<span>When a person goes to set up a direct deposit slip from their checking checking they will need several things. They person will need the routing number to the financial institution and the checking account number from the financial institution. Both of these can be found on the bottom of a check. The person will also need to know the full name of the bank they are using. If the person has a debit card only, they will need to contact the bank to get their specific information to set up the direct deposit.</span><span />
5 0
3 years ago
well im a gamer and i wait for a while befoer i accept a friend request from someone i know so i think its A
mamaluj [8]
What is your question though?
7 0
3 years ago
Other questions:
  • This type of server spools documents and puts them in a queue.
    12·1 answer
  • What usually happens at a police check? Do they just look up your name in their system?
    6·1 answer
  • What does DKIM stand for?
    9·2 answers
  • Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
    6·1 answer
  • Why are specification for food processing tool,equipmentand untensils necessary?​
    8·1 answer
  • Which of the following is used to describe an authentication scenario in which a user logs in using a PIN and a security token
    7·2 answers
  • a user has a large amount of data that she or he needs to store. the data will not be accessed regularly, but still needs to be
    5·2 answers
  • What specific job usually includes the important pre-production step of making the
    12·1 answer
  • Consider the following implementation of a search method:
    13·2 answers
  • You have a slicer and a chart on the same page for your sales data by state. If you use the menu to sort by territory in alphabe
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!