1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harrizon [31]
3 years ago
12

A key field is used to _____. enter a password uniquely identify records merge data list the most important information

Computers and Technology
2 answers:
Arada [10]3 years ago
6 0

Answer:

Explanation:

We can use a key field as a unique field, we can make reference with other tables, each table only can have one key field, and some programs like access can make this field automatically, if we want to have a correct key field we must follow these steps:

  • never be empty
  • the value never must change
  • The value must be unique
Artist 52 [7]3 years ago
6 0

Answer:

uniquely identify records !!!!

You might be interested in
In which file format is image data compiled into a binary file? TIFF SVG CGM BMP
Licemer1 [7]

BMP (Bitmap). I may be wrong. I'm sorry.

6 0
4 years ago
Back in the mid-1800s, who was one of the first artists to retouch negatives to reduce or eliminate any imperfections in the sho
tia_tia [17]

Answer:

Calvert Richard Jones

Explanation:

Just five years later, in 1846, the first known act of photographic retouching was performed by a Welsh colleague of Talbot's named Calvert Richard Jones, or perhaps by one of Jones's associates

6 0
3 years ago
Read 2 more answers
Which item is used in Excel to identify the row of a particular cell? letter number type sheet
Alik [6]

It can be any letter or number as long as its validated.

7 0
4 years ago
Read 2 more answers
Does anyone know what these two things are?
Sergio [31]
Cd and headphones :)
3 0
3 years ago
Read 2 more answers
IT professionals should help to protect users’ personal information, such as bank account information or Social Security numbers
sesenic [268]

To prevent theft of account information, identity theft, money, important passwords, and personal information.


Hope it helps ❤️

8 0
4 years ago
Read 2 more answers
Other questions:
  • On the food inventory worksheet, enter a function in cell G1 that counts the number of Food Items. What formula would i use!? Th
    5·1 answer
  • The _____ element, a hypertext markup language (html) metadata element, contains a collection of metadata elements that describe
    11·2 answers
  • Write a Java application that inputs a series of 10 integers and determines and prints the largest and smallest integer. Use a c
    12·1 answer
  • A technician is talking to end users about the specifications for an upgraded application server. The users of the application r
    11·1 answer
  • Consider a computer system, where each processor can independently perform a separate task. given that the response time on a co
    10·1 answer
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • A user’s laptop hard drive contains sensitive information. The user often plugs the laptop into the corporate network. A sensiti
    14·1 answer
  • Which type of mic is durable, versatile and does not rely on power?
    14·2 answers
  • explain why you can determine machine epsilon on a computer using IEEE double precision and the IEEE Rounding to Nearest Rule by
    7·1 answer
  • Identify the end-to-end processes that should appear in the process landscape model.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!