1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
4 years ago
13

In a relational database, a primary key is sometimes made up of multiple fields. What is this known as?

Computers and Technology
1 answer:
wlad13 [49]4 years ago
5 0

Answer:

Foreign key is the correct answer for the above question.

Explanation:

  • A foreign key is a key that is used to extract the information of a foreign table with the help of primary key value. When there is a normalized table then it needs to split on two or more tables to overcome the problem of normalization.
  • So is there is a two table then the primary key is used for the first table and the combination of the primary key and foreign key is used to identify the record of the foreign table. The foreign key is made up of multiple fields because there is no single field in the foreign which can not be null for any instance of the primary table. It happens when there is data for the primary table but there is no record for the foreign table.
  • The above question wants to ask about the term which is made up of multiple fields which is a foreign key which is described as above. Hence Foreign key is the correct answer for the above question.
You might be interested in
"Na2SO3” represents sodium sulfite.
STatiana [176]
There are four atoms
5 0
3 years ago
Read 2 more answers
For businesses and organizations under recent compliance laws, data classification standards typically include private, confiden
Anon25 [30]

Answer:

True is the correct answer for the above question.

Explanation:

  • To secure the data is the first rule for any organization because when the data is lost or unsecured the whole system can have the problem.
  • If any person wants to hack the system or any organization then they first choose to hack the data of the system.
  • So there is a Hundred of law in the US taken by the US government at the Federal trade commission act to secure the data of the organization.
  • The above question also states the same which is defined above. Hence It is a true statement.
6 0
3 years ago
Which of the following sentences is written in the active voice
STALIN [3.7K]
D. The chocolate cake will be served to the queen. This is the only one not in past tense. Active means present or near present, hence the word "will." 
3 0
4 years ago
Read 2 more answers
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
3 years ago
Write a method that takes two arguments: two integers. The integers are then squared, added and the result printed on the screen
diamong [38]

Answer:

import java.util.Scanner;

class Main

{

   

     public static void main(String[] args)  

     {

     System.out.println(" Enter the the two numbers:");

     Scanner input = new Scanner(System.in);

     int a = input.nextInt();

     int b = input.nextInt();

     int c = sumsquareFunction(a, b);

     System.out.println("Sum of Square of two numbers are:" + c);

     }

public static int sumsquareFunction(int n1, int n2) {

     int c= n1*n1 + n2*n2;

     return c;  

  }

}

Explanation:

Please check the answer.

6 0
4 years ago
Other questions:
  • An important piece of a project is past due date.
    9·2 answers
  • Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu
    9·1 answer
  • Who invented the ENIAC? More than one answer may apply.
    14·1 answer
  • Create the tables and appropriate constraints based on the following ER diagram. Use appropriate data types. Note that the size
    7·1 answer
  • In C++ write a program that prints out PI as a type double and a type float EXACTLY as shown below. Your program should have ONE
    13·1 answer
  • What is ur Favorite anime
    8·1 answer
  • What is E-Commerce? Answer The Following. Pls Help Me​
    5·1 answer
  • The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Gr
    8·1 answer
  • Tạo biến
    8·1 answer
  • Which Windows registry hive stores information about object linking and embedding (OLE) registrations
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!