1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
9

When would you use a composite primary key? Group of answer choices

Computers and Technology
2 answers:
taurus [48]3 years ago
8 0

Answer:

d. A many-to-many relationship

Explanation:

A composite primary key is the key that uses two or more attributes to uniquely identify any row in a table. These are usually used in associative entity table in which many to many relationship between 2 or more other table exists.

Example:

Suppose we have a table which consists of 4 columns:

student_ID, subject_ID, subject_name and marks.

Here the student_ID and subject_ID can be combined together to form the composite primary key.

vichka [17]3 years ago
6 0

Answer:

A. Multi-field attributes

B. A ternary relationship

C. A unary relationship

You might be interested in
Write the algorithm for finding the perimeter of a rectangle using English like form step by step
olya-2409 [2.1K]
L+L+W+W= Permiter
Or Lenght+Lenght+Width+Width= Perimeter
That’s all just add all the 4 sides
8 0
3 years ago
Mary is writing an article about the animal kingdom. She wants to place image below the text. Which menu should Mary choose for
marysya [2.9K]

The Wrap Text menu.

The positioning of text in Word is sometimes not lined up with the inserted picture. By default, when you insert an image or a picture, its layout is set to inline with text. To change that, double click on the picture and then click the Wrap Text option. A number of options will pop up with text graphics.


7 0
3 years ago
Read 2 more answers
What should you do first when designing a program?
Nady [450]

Answer: talk about da progrm

Explanation:

6 0
3 years ago
Read 2 more answers
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
Many large IT departments use a(n) _____ team that reviews and tests all applications and systems changes to verify specificatio
mafiozo [28]

Answer:

Quality assurance team

Explanation:

Software development life cycle (SDLC) is a process or stages of processes a software application must go through to be materialized. The stages of SDLC are planning, design, implementation or development, testing or verification, deployment and maintenance.

An implemented software design must be tested. It is tested based on the pre-dertermined design and the quality standard of the company. A group of test expect are approached for this purpose, they are called the quality assurance team

They are equipped with skills to use third party applications to analyze and verify the quality of the developed software.

6 0
3 years ago
Other questions:
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • Which data type uses more memory an integer or an unsigned integer?
    6·1 answer
  • In fiberoptic cable, the signal source is__________waves
    7·1 answer
  • Discuss anomaly detection.
    5·1 answer
  • What is hydraulic fracturing?
    7·1 answer
  • What is the name of the most expensive car and how much is it and what are its features
    15·1 answer
  • What is gender bias?
    9·1 answer
  • What do financial planning skills ultimately enable an individual to do?
    10·2 answers
  • What is the 3 different storage requirements a computer has to process data​
    12·1 answer
  • I need help with my work
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!