1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
3 years ago
5

Under what circumstances are composite primary keys appropriate?

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
8 0
A composite primary key<span> is a set of several primary </span>keys<span> that, together, uniquely identifies each record.</span>
Primary keys are used as identifiers of composite entities. In this case each primary key combination is allowed only once in the *:* relationship.
Other case where primary keys are used is as identifiers of weak entities, where the weak entity has a strong identifying relationship with the parent entity. 
You might be interested in
What is communication ????<br>​
Delicious77 [7]

Answer:

Communication is the act of giving, receiving, and sharing information -- in other words, talking or writing, and listening or reading. Good communicators listen carefully, speak or write clearly, and respect different opinions.

(≡^∇^≡)

8 0
2 years ago
Read 2 more answers
SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee
masha68 [24]

Answer:

b. It uses community string that is transmitted in clear text.

d. It is used by all network devices on the market.

Explanation:

SNMP is an acronym for Simple Network Management Protocol and it is a standard protocol which allows network administrators to manage network devices and client computers remotely.

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

The SNMP agent on a network device such as a router authenticates any SNMP Get requests that are being received from the network management software (NMS) using either the read-write or read-only community string.

The features which makes this possible are;

I. It uses community string that is transmitted in clear text.

II. It is used by all network devices on the market.

6 0
2 years ago
Suppose you are working in a computer lab during the work you are facing window failure or other technical issues.How you will s
11111nata11111 [884]

discord

.gg/progamming

4 0
3 years ago
Tom is very curious as to whether terrorism is truly linked to levels of religiosity around the world. As such, he gathers data
Ede4ka [16]

Answer:

Macrosociology

Explanation:

Sociological perspective or perspectives on sociology is an implied definition on how sociologists study and creates theories systematically, through predetermined theories. There are two perspectives sociologists view subject matters, they are macrosociology and microsociology perspectives.

The microsociology perspective describes the symbolic interactionism of individuals as a unit.

The macrosociology perspective studies the functional and conflict theories, which are the interaction of individuals in groups or communities and their impact to the society.

4 0
3 years ago
An optimal solution to a linear programming problem MUST lie A. somewere on the line between two corner points. B. somewhere out
g100num [7]

Answer:

D. at the intersection of at least two constraints.

Explanation:

Linear programming is an optimization technique which is fine for the purpose of getting the best solution such as maximizing profit or certain o 4th era quantities. It is fine by modelling real life problems into mathematical models that have linear relationships or constraints such as in the form of objective functions. In linear programming, an objective function defines the formula for quantity optimization and the goal from this is to determine variable values that maximize or minimize the objective function depending on the problem robbery solved.

8 0
3 years ago
Other questions:
  • It is either snoming or below freezing
    10·1 answer
  • What problem with internal hardware components is similar to unplugged
    6·2 answers
  • The date June 10, 1960, is special because when it is written in the following format, the month times the day equals the year:
    5·1 answer
  • What is the maximum upload speed you can get on an isdl internet connection?
    9·1 answer
  • You want to make the background of a Web page blue, click _____.
    13·2 answers
  • The first idea for a communications network was called
    14·2 answers
  • Which camera mode gives the photographer the greatest amount of control?
    7·2 answers
  • What creative commons license allow for the work to be copied, distributed, displayed, or performed but modifications may not be
    13·1 answer
  • What are examples of Table Tools options that can help edit data?
    15·2 answers
  • The post-closing trial balance shows the balances of only the ____ accounts at the end of the period.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!