1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
3 years ago
10

Composite primary keys are particularly useful as identifiers of composite entities, where each primary key combination is allow

ed only once in the _____ relationship.
Computers and Technology
1 answer:
notka56 [123]3 years ago
6 0

Answer:

M:N is the correct answer of this question.

Explanation:

M:N relationship is known as many to many relationship.

There is a many-to-many relationship when numerous data in a table are connected to duplicate entries from another table.The multiple-to-many relation is typically a duplicate of the true-life association between entities represented by the two or more  tables.

  • A Relation is a kind of fractal dimension corresponding to the partnership between two entities.
  • A and B where A may comprise a case of a parent and therefore there are numerous children in B, and opposite of that also occur.

You might be interested in
Is this free? do i have to pay to use this app??
Virty [35]
No i don’t have to pay but there is additional stuff if you pay but i don’t pay for anything
3 0
3 years ago
What is JavaScript? JavaScript is a _____ language.
disa [49]

Answer: dynamic computer language

Explanation:

JavaScript is a dynamic computer language. Hope this helps! (•‿•)

5 0
2 years ago
Read 2 more answers
If you are in a crash where you are at fault and injuries have occurred, the Financial Responsibility Law requires you to have b
ki77a [65]
Yes. If you are in an accident you must carry your insurance. It is required by law to have insurance.
3 0
3 years ago
Device management is the process of managing what kinda devices? :)
Anika [276]
Device management is the process of managing "Physical Devices" like <span>ports and interfaces of a computer or server

Hope this helps!</span>
4 0
3 years ago
What information is contained in the title bar
Varvara68 [4.7K]

Answer:

like the url i think

Explanation:

8 0
3 years ago
Other questions:
  • A risk handling technique in which the organization chooses to simply do nothing, as the cost of the risk being actualized is lo
    15·1 answer
  • What does the following code alert?
    10·2 answers
  • In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours
    8·1 answer
  • What is the benefit of using pre-programmed functions to analyze data?"
    7·1 answer
  • Implementations <br> in c++ programming when finding lcm and gcd in c++​
    12·1 answer
  • Calculate The Average of Grades Instructions:
    8·1 answer
  • What Is What is the difference between system software and application software?<br>​
    11·1 answer
  • Hello everyone can help me give all the answer​
    12·1 answer
  • In your own opinion how comes the surface grinding machine is called a highly accurate machine tool?​
    11·1 answer
  • An incident response plan should be created be for a software system is released for use.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!