1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
13

In a relational database, a primary key is sometimes made up of multiple fields. What is this known as?

Computers and Technology
1 answer:
wlad13 [49]3 years ago
5 0

Answer:

Foreign key is the correct answer for the above question.

Explanation:

  • A foreign key is a key that is used to extract the information of a foreign table with the help of primary key value. When there is a normalized table then it needs to split on two or more tables to overcome the problem of normalization.
  • So is there is a two table then the primary key is used for the first table and the combination of the primary key and foreign key is used to identify the record of the foreign table. The foreign key is made up of multiple fields because there is no single field in the foreign which can not be null for any instance of the primary table. It happens when there is data for the primary table but there is no record for the foreign table.
  • The above question wants to ask about the term which is made up of multiple fields which is a foreign key which is described as above. Hence Foreign key is the correct answer for the above question.
You might be interested in
Why are typewriter keys arranged the way they are?
loris [4]
They are arranged the way they are because of the QWERTY layout. It was used to slow down how people typed so they wouldn't get the typewriter jammed. Hope this helps. :)
4 0
3 years ago
You received a call form a user who brought her own device to the office but cannot find or connect to the company WLAN. The lap
lapo4ka [179]

Answer:

Company WAP has SSID broadcast disable

Explanation:

Disabling SSID broadcast will make your WLAN network name invisible to other users. However, this only hides the name, not the network itself. that's why the user cannot find the company WLAN on her computer but yet can connected to the company WLAN and can browse to multiple websites with no problem from their company-assigned laptops.

8 0
3 years ago
HELP! WILL GIVE BRAINLIEST
maw [93]

Answer:

Creative, helpful, communicative, colorful, detailed

Explanation:

6 0
2 years ago
Read 2 more answers
¿Por qué es importante aprender a programar?
White raven [17]

Answer:

Es importante aprender a programar, por que es el mismo de que alguen aregle su carro. En estos tiempos, la technolagia se ha convertido en la nueva normal. Va vinir el tiempo quando nosotros necesitamos que arreglar un linia de codigo en nuestras computadoras, y no esta necesario para pagar alguen que ellos lo agan. Como quando necesitas que poner una llanta nueva a tu carro. Tu lo puedes cambiar solo. Entonses como el ejemplo del carro, tu puedes arreglar el linia de codigo en la computadora sin pagar alguen por acerlo.

7 0
2 years ago
Suppose an array of country codes and country names is created with a statement like this: $country_codes = array('DEU' => 'G
valentina_108 [34]

Answer:

Following are the code in the PHP Programming Language:

<u>foreach ($country_codes as $code => $name) { </u>

Explanation:

The following option is true because the Foreach statement only works on the objects and array and this statement is good for accessing the key and value pairs from the array.

So, that's why to print following associative array through echo statement we use the Foreach loop statement with following right condition.

<u>syntax</u>:

foreach (array as value)

{

  code or body to execute;

}

8 0
3 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • The process of changing data from their original form to a format that more closely fits the research objectives of the research
    9·1 answer
  • A public Wi-Fi risk that can be minimized by only visiting
    5·1 answer
  • If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki
    6·2 answers
  • What is the maximum number of fonts that should be used on a slide?
    13·1 answer
  • Some numbers are formed with closed paths. the digits 0, 4, 6 and 9 each have 1 closed path and 8 has 2. None of the other numbe
    6·1 answer
  • Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index (BMI).
    11·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • Which of the following is an example of a trade journal?
    7·2 answers
  • Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!