1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
3 years ago
5

Under what circumstances are composite primary keys appropriate?

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
8 0
A composite primary key<span> is a set of several primary </span>keys<span> that, together, uniquely identifies each record.</span>
Primary keys are used as identifiers of composite entities. In this case each primary key combination is allowed only once in the *:* relationship.
Other case where primary keys are used is as identifiers of weak entities, where the weak entity has a strong identifying relationship with the parent entity. 
You might be interested in
A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
Lyrx [107]

Answer:

Back up the user data to removable disk

Explanation:

Before you work on a computer, especially anything that has to do with files not accessible, this might need to format the system because it might either be a virus or other forms of malware. Since backup was done to a different logical partition on the disk, the first thing to do before performing any diagnostic procedures on the disk is to back up the user data to a removable disk in order not to lose the information in the system.

8 0
3 years ago
The area that holds all the instructions the computer needs to start up when it is powered on is ________.
stepan [7]

The area that holds all the instructions the computer needs to start up when it is powered on is b) ROM

Further Explanation:

RAM and ROM are the types of memory. RAM is the active memory. The data can be read and written from RAM. While ROM is read only which meas that data or instructions on ROM cannot be changed.

The files or instructions that are needed to start up a computer are usually unchangeable as they always have to be the same. These type of instructions are stored in ROM. When he computer is turned on, the instructions needed to start the computer are loaded into the main memory from the ROM.

Hence, ROM is the correct answer.

Learn more at:

  • brainly.com/question/10196212
  • brainly.com/question/10250188

#LearnwithBrainly

7 0
3 years ago
Write an expression that executes the loop while the user enters a number greater than or equal to 0. Note: These activities may
RoseWind [281]

Answer:

while ( num >= 0) { ... }

Explanation:

Required

Express to execute a while loop with the given condition.

The condition in the question is that: the user input must be greater than or equal to 0.

The statement for this is:

while ( num >= 0) { ... }

Where num is the input variable

8 0
2 years ago
If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
777dan777 [17]

Answer:

The WLAN would fall within the LAN Domain.

Explanation:

<em>Because, the domain that you would need to implement web content filters would be the LAN-WAN. Reason being that the LAN-WAN needs the web content filters in order to filter the data that is coming in from outside of the network and to allow good data to be able to be passed back and forth.</em>

4 0
3 years ago
Which of the following are examples of packages you can import and use classes from in java?
Svetlanka [38]
It’s D java. int i think
8 0
3 years ago
Other questions:
  • Why has unicode become the standard way of converting binary to text??
    8·1 answer
  • Assuming your computer only has one network card installed; explain how your virtual machine is able to share that card with you
    10·1 answer
  • Which of the following attributes of a website indicates a more reliable source for information?
    8·1 answer
  • A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and proc
    10·1 answer
  • Write a C++ Programm in which inheritance is used
    7·1 answer
  • The profile picture that you plan to use to market your professional brand on social media networks should feature you only.
    12·1 answer
  • If wearing protective gloves, there's no need to wash your hands after exposure to blood.
    14·1 answer
  • Types of Computer games​
    6·1 answer
  • What types of company functions are aided by ERP?
    9·1 answer
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!