1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Norma-Jean [14]
3 years ago
13

You have just finished entering field names for your database . You need to choose the primary key or key field but none of your

fields are unique. What should you do ?
A. Save the database without a key field
B. Use one of the existing fields even if it is not unique
C. Let the database assign a unique number in a new field
D. Use a spreadsheet instead
Computers and Technology
2 answers:
levacccp [35]3 years ago
6 0

Answer:

Option C is the correct answer to the following question.

Explanation:

In the following option is true because when once the entering of the fields name is done and you didn't choose any of the fields as primary but you want to choose field as primary and you also not choose any field as unique then, you should do one thing, you have to assign a unique number in your database in a new field.

Luden [163]3 years ago
3 0

C. Let the database assign a unique number in a new field

You might be interested in
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby o
Karo-lina-s [1.5K]

Answer:

<u>VLANs</u>

Explanation:

Virtual LANs (VLANs) are a type of network connection or arrangement of network devices in the same broadcast domain. They are called Virtual LANs because they represent fractions or subgroups in the switch ports found in an Ethernet LAN.

Indeed, because of their topological arrangement, this reduces the security risk of unauthorized access to sensitive data or devices since the host can be placed on a different VLAN. Hence, in this scenario, using this network feature would allow visitors to plug into these ports to gain internet access, but they would not have access to any other devices on the private network.

5 0
2 years ago
Which of the following information sources was not directly affected by the Telecommunications Act of 1996?
VMariaS [17]
Apparently, the answer is newspaper publishing.

Since telecommunication is defined to use wireless and electrical protocols to transmit data.
6 0
3 years ago
Which tab of the ribbon includes the links group for creating hyperlinks or internal references?
Deffense [45]
The correct answer is D.File
5 0
3 years ago
Read 2 more answers
What is the most complex part of a PC?
rjkz [21]

Answer:

From a hardware standpoint, the CPU is most likely the main component. From a software standpoint, macOS and Windows are complex software systems.

Explanation:

6 0
2 years ago
I microwaved my phone and this Bluetooth popup won't go away and I can't connect to Bluetooth. Help. I have a Google pixel 3XL I
Kobotan [32]

Answer:  Why'd you'd Microwave your phone?

Explanation: Ok first don't do that, it can make it explode, and since you did that, it messed up something, you'll have to get it fixed or buy a new one

Hope this helps^^

7 0
3 years ago
Other questions:
  • Which type of device log contains the most beneficial security data?
    7·1 answer
  • An optimal solution to a linear programming problem MUST lie A. somewere on the line between two corner points. B. somewhere out
    12·1 answer
  • Write a program that prints the following text: In C, lowercase letters are significant. main() is where program execution begin
    14·1 answer
  • With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are
    9·1 answer
  • You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudo
    14·1 answer
  • 16 to 19 year old drivers are how many more times likely to crash? 1.7,2.7,0.7 ,3.7
    12·2 answers
  • In the code snippet, what is the “win” part called in programming?
    12·1 answer
  • With _________, users will receive recommendations for items liked by similar users.
    9·1 answer
  • An acceptable website design is one that meets
    14·2 answers
  • What legal protection would cover a person invention?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!