1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
3 years ago
14

​if a primary key combines two or more fields, then it is called a _____.

Computers and Technology
1 answer:
spin [16.1K]3 years ago
3 0

Answer:

Composite primary key, or simply, composite key

Explanation:

When multiple fields (columns of a table) are combined to form a primary key, the resulting key is called a composite key.

Hope this helps!

You might be interested in
That's my email address​
rodikova [14]
Okay then that’s pretty cool
3 0
2 years ago
____ is a bundled set of communications services, including internet, telephone, and tv, that operates over a total fiber-optic
Genrish500 [490]
I think your answer here is "FiOS"
4 0
3 years ago
Truck drivers probably can't see your vehicle if ______________.
Arada [10]
<h2>Answer:</h2>

Truck drivers probably can't see your vehicle if you cannot see them in their side mirror

<h2>Explanation:</h2>

In driving terminology there is a term called the bind spot. Blind spot is the area where the driver is not able to see the vehicle behind him and this area is present just behind the truck and very close to the gates of the car. Since trucks do not have the rare mirror therefore if a car is present in their blind spot they wont be able to see it. The driver behind the truck can spot it if he does not see the truck driver in the side mirror of the truck.

5 0
3 years ago
Read 2 more answers
You are the CEO of a large tech company and have just received an angry email that looks like it came from one of your biggest c
sergejj [24]

Answer: as a whale attack

Explanation:

A whale attack is simply refered to as an attack that is utilized by cybercriminals and in this case, a senior player such as the CEO is targeted in the company and the aim is to steal sensitive information from them or steal money or gain access to their computer for fraudulent purposes.

Based on the explanation above, the attack called into is a whale attack.

4 0
3 years ago
How did mechanical clocks assist in completing work? How was work done previously?
lozanna [386]

Answer

Timekeeping has been a part of society since Ancient Egypt. The use of spring-powered mechanisms allowed clocks to be made smaller ... Essentially, the church bells and the mechanical clock now became the monitor of the working day.

Explanation:

4 0
3 years ago
Other questions:
  • Stefan is finalizing his presentation by adding media files and preparing it for distribution. Stefan knows that saving a presen
    13·1 answer
  • • Write a program to find the maximum, minimum, and average score of players. The input to the program is a file containing play
    9·1 answer
  • Which of the selection below does not represent a workable IP address?
    9·1 answer
  • True or False: Changing a bid package's status to "Closed" removed it from the bidder's Planroom and the bidder will no longer b
    15·1 answer
  • 1.printer is an example of......... device.<br><br>​
    11·2 answers
  • Hello help me with this please if you want to thank you I would give brainlist!
    13·2 answers
  • (Display characters) Write a method that prints characters using the following header: public static void printChars(char ch1, c
    6·2 answers
  • There is a file of a few Sean Connery movies on the internet. Each entry has the following form:
    9·1 answer
  • I’ll give brainliest if answers are correct
    11·1 answer
  • In order to get the maximum functionality out of a device that is plugged in, a user should download the specific ___ for that d
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!