1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
12

A key field is used to _____. enter a password uniquely identify records merge data list the most important information

Computers and Technology
2 answers:
Arada [10]3 years ago
6 0

Answer:

Explanation:

We can use a key field as a unique field, we can make reference with other tables, each table only can have one key field, and some programs like access can make this field automatically, if we want to have a correct key field we must follow these steps:

  • never be empty
  • the value never must change
  • The value must be unique
Artist 52 [7]3 years ago
6 0

Answer:

uniquely identify records !!!!

You might be interested in
Do you need a contractor to install nest thermostat
Natalka [10]

Answer:

Sometimes yes, sometimes you can do it yourself

Explanation:

Installing a Nest thermostat can be done yourself without an electrician in most cases. Nest thermostats are designed to work in homes without a common (“C”) wire. However, there are rare cases a C wire or other power-supply accessory may be required. An electrician is recommended in these rare cases.

5 0
2 years ago
How to write an algorithm to read and print a name?<br> I want the steps please
bearhunter [10]

Answer:

Step 1: Obtain a description of the problem. This step is much more difficult than it appears. ...

Step 2: Analyze the problem. ...

Step 3: Develop a high-level algorithm. ...

Step 4: Refine the algorithm by adding more detail. ...

Step 5: Review the algorithm.

Explanation:

8 0
2 years ago
Melissa just bought a new entertainment system for her apartment. It includes a flat-screen TV, surround-sound speakers, and a v
harkovskaia [24]

She should get personal property insurance

4 0
3 years ago
Read 2 more answers
List three functions that you can perform with a database that you cannot perform with a spreadsheet.
Delicious77 [7]
There are some function which can be performed with database but not with a spread sheet, these functions include: 
1. Enforcement of data type.
2. Support for self documentation.
3. Defining the relationship among constraints in order to ensure consistency of data.
5 0
2 years ago
An attacker on the network intends to overwhelm another computer with icmp packets as follows:
Blizzard [7]
And, the simple answer is to disable ICMP echo requests on either the router or Workstation.
4 0
3 years ago
Other questions:
  • The specific term for expediting the delivery of software by breaking a task into smaller increments is called
    12·1 answer
  • 1. of the following individuals, who was the most recent to develop information searching tools online? (points : 1) otlet wells
    5·1 answer
  • Discuss in detail why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal
    6·1 answer
  • Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
    12·1 answer
  • A model is replica that?
    11·2 answers
  • Who is the father of computer?​
    14·1 answer
  • A specialized output device for producing charts, maps, and very high-quality drawings is
    5·1 answer
  • What is the purpose of heading tags?
    15·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
  • For a web application we associate a web server, for a mobile application we associate a mobile server. for a decentralized appl
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!