1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
9

The relational database is the primary method for organizing and maintaining data today in information systems. It organizes dat

a in two-dimensional tables with rows and columns called relations. In a database, __________ is used to uniquely identify each record for retrieval or manipulation.
Computers and Technology
1 answer:
levacccp [35]3 years ago
5 0

Answer:

A key field is used to uniquely identify each record for retrieval or manipulation.

Explanation:

In a database there are many, having similar entities. So in order to differentiate each entity from other we need to set a key field among all the field which is always unique for each entity.

For example:

In a database of a company having data about its employees, the key field might be their ID. As some employees can have same names, addresses, phone numbers but cannot have the same ID.

You might be interested in
Dedicated server hosting and dedicated web dedicated is the same ??????
andrezito [222]

The correct answer is; False.

Further Explanation:

Dedicated server hosting and a dedicated shared hosting is two different things. When a person is using dedicated server hosting they are using a server that only hosts their website. When a person is using a dedicated shared host they are actually sharing the site with others. When using the shared server they must use only an allocated amount of space and bandwidth.

The costs of these services will vary depending on which you use. Shared servers will pay less for the website since they share the costs with the other site owners. While, a dedicated server will cost more since there is no one to share the cost with.

Learn more about server hosting at brainly.com/question/8429135

#LearnwithBrainly

3 0
3 years ago
Which one of these do you need to become president of the US ?
gladu [14]

Answer:

Tbh i dont even know

Explanation:

I had who i wanted to become president but i don't even know anymore

7 0
2 years ago
Read 2 more answers
9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
DaniilM [7]

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

8 0
3 years ago
Gateway drugs are normally not addictive
scoundrel [369]
They are drugs that are <span>easy to get and ARE usually addictive</span>
5 0
3 years ago
Read 2 more answers
Microsoft excel is a __________ application.
Nastasia [14]
B. spreadsheet is the answer
3 0
3 years ago
Other questions:
  • 286795991 número pra convidar no tiktok​
    11·2 answers
  • What is the function of the capsid? it allows a virus to live independently. it is composed of genetic material. it destroys the
    12·2 answers
  • What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
    6·1 answer
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • What should be done with statements or sections which are unclear?
    12·2 answers
  • 3.17 (LAB) Ch 5 Warm up: Drawing a right triangle (Python 3) This program will output a right triangle based on user specified h
    10·1 answer
  • Cuales son las paginas web​
    12·1 answer
  • Which command os used to find a particular word in a document ?<br>​
    9·2 answers
  • susan wrote the recursive formula for the sequence represented by the exploit formula An=3+2n. put an C net to any correct state
    13·1 answer
  • Why is translator required?​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!