1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
9

The relational database is the primary method for organizing and maintaining data today in information systems. It organizes dat

a in two-dimensional tables with rows and columns called relations. In a database, __________ is used to uniquely identify each record for retrieval or manipulation.
Computers and Technology
1 answer:
levacccp [35]3 years ago
5 0

Answer:

A key field is used to uniquely identify each record for retrieval or manipulation.

Explanation:

In a database there are many, having similar entities. So in order to differentiate each entity from other we need to set a key field among all the field which is always unique for each entity.

For example:

In a database of a company having data about its employees, the key field might be their ID. As some employees can have same names, addresses, phone numbers but cannot have the same ID.

You might be interested in
What is a Forloop and what is it used for?
anastassius [24]
It is used to repeat any block of code multiple times (iteration)
6 0
3 years ago
Read 2 more answers
What do you do to think positive and maintain discipline to play
Agata [3.3K]

Answer:

to make peaceful mind.to develop our character..

6 0
3 years ago
How do I add my bestie on brainy? /??!!! ​
ziro4ka [17]

Answer:

You have to remember their name on here

Explanation:

If u dont you cant talk to them again

3 0
2 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
3 years ago
Read 2 more answers
What is output in computer?​
Goryan [66]

Answer:

An output is data that a computer sends. An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered. An example of output is the electricity produced by a power plant. An example of output is producing 1,000 cases of a product.

3 0
3 years ago
Other questions:
  • Which statement describes the word "iterative"?
    9·1 answer
  • The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities.
    15·1 answer
  • How to select the entire table in microsoft excel
    11·1 answer
  • ServletConfig defines a set of methods that a servlet uses tocommunicate with its servlet container.
    5·1 answer
  • Write syntactically correct Javascript code to sort an array of sub-arrays containing integers using the sort and reduce array f
    11·1 answer
  • what version of the internet do we use as an interactive social system in which users are able to interact with senders
    7·1 answer
  • What was the first video game ever invented
    11·2 answers
  • Why is weather forecast so important for hang gliders?
    12·1 answer
  • What is the Intranet?<br>​
    5·1 answer
  • Premise: Tracy has a file that contains a list of actors and the movies in which they acted. She wants to know the top 3 ranked
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!