1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
9

When would you use a composite primary key? Group of answer choices

Computers and Technology
2 answers:
taurus [48]3 years ago
8 0

Answer:

d. A many-to-many relationship

Explanation:

A composite primary key is the key that uses two or more attributes to uniquely identify any row in a table. These are usually used in associative entity table in which many to many relationship between 2 or more other table exists.

Example:

Suppose we have a table which consists of 4 columns:

student_ID, subject_ID, subject_name and marks.

Here the student_ID and subject_ID can be combined together to form the composite primary key.

vichka [17]3 years ago
6 0

Answer:

A. Multi-field attributes

B. A ternary relationship

C. A unary relationship

You might be interested in
Where are the instructions stored that the computer needs when it is switched on?
WARRIOR [948]
This is stored in the ROM (Read Only Memory)
I believe that is the answer, all i can come up with.
4 0
3 years ago
Who needs to be involved when assembling business solutions that include hardware and software?
sveta [45]
Software engineer i would say
5 0
3 years ago
Read 2 more answers
Define power supply and types of power supply<br>​
emmainna [20.7K]

Answer:

hope you like it

Explanation:

Two types of power supplies exist, DC-DC and AC-DC. DC-DC power supplies allow you to plug in electrical devices into car outlets or similar sources that supply direct current, or DC, power. These power supplies are not the most commonly used, though.

Classification of Power Supply and Its Different Types

OUTPUT = DC OUTPUT = AC

INPUT = AC Wall wart Bench power supplies Battery charger Isolation transformer Variable AC supply Frequency changer

INPUT = DC DC-DC converter Inverter Generator UPS

4 0
3 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
Will somebody please explain to me HTML?
larisa86 [58]

Answer:

Hypertext Markup Language (is also known as html) is the standard markup language for creating web pages and web applications.

3 0
3 years ago
Other questions:
  • The trademarked name of the accepted standard for configuring wireless networks is _______________
    12·1 answer
  • What is the 7 X 7 when referring to PowerPoint presentations?
    12·2 answers
  • Which type of text may be formatted to print at the bottom of every page?
    6·1 answer
  • Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
    13·1 answer
  • Suppose barriers to entry exist in the telecommunications industry. This best describes a _____ market.
    12·1 answer
  • What operating system is an open source program
    15·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this
    7·1 answer
  • You want a cable that could be used as a bus segment for your office network. The cable should also be able to support up to 100
    5·1 answer
  • The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!