1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
6

Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c

redit if it is for 1 semester and 1 credit if it is for 2 semesters. Which field should Rob assign as a primary key in the table?
Computers and Technology
2 answers:
Digiron [165]3 years ago
7 0
As a<span> </span>primary key<span> is a field in a table which uniquely identifies each row/record in a database table, then the advisable field for the primary key in here should be the Course_ID. That is very unique in that table</span>
gavmur [86]3 years ago
7 0

Answer:

Course_ID should be made the primary key

Explanation:

For a field to be made a primary key, the following among other things, should hold;

1. It must be unique: It cannot contain duplicates. Every row/entry has a different value of the field. Course_ID satisfies this condition. Every course has their own different ID. Course_Name may also satisfy this condition. Every course may have their own separate name. Other fields do not satisfy this condition. One or more courses may be taken in the same semester and may also have the same credit unit.

2. It must not be null: For a field to be made a primary key, it must not contain null values. All fields satisfy this condition though.

3. It must not change over time: A field that could be changed so frequently should not be made a primary key. Among all the fields listed, only Course_ID completely satisfy this condition. Course_ID cannot be easily or frequently changed. There are higher chances that other fields change anytime.

4. Preferably numeric: Numeric fields are better used as primary key so that certain rules could be applied to automatically generate them. For example, one might create a rule that auto increments the field dynamically. Course_ID satisfies this condition.

Hope this helps!

You might be interested in
File-sharing programs such as Napster, Kazaa, and iMesh make it possible for individuals to exchange music files over the Intern
Mashutka [201]

Answer:

Option A) Demand for CDs has decreased, causing equilibrium price and quantity to decrease.

is the correct answer.

Explanation:

  • File-sharing is a common practice nowadays. It helps us by providing access to different files (audio , video, images, documents) to others in a faster way.
  • A wide range of files are shared daily by using different means of file-sharing including computer networks and peer-to-peer networking.
  • Formerly, the data was shared using CDs but now this system has been replaced with the advent of internet.
  • Usage of CDs is dropped drastically and hence their demand is decreased.
  • So now the prices of CDs are not in equilibrium and their quantity is also decreased.

i hope it will help you!

3 0
3 years ago
Types of computer viruses<br>​
e-lub [12.9K]

Answer:anti various

Explanation:hope fully this will help u

5 0
3 years ago
Read 2 more answers
4 types of system software
Elina [12.6K]
Operating systems.
Device drivers.
Middleware.
Utility software.
8 0
3 years ago
Read 2 more answers
Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes
Tom [10]

Answer:

Computer Monitors earned him maximum profit. For details, please check the attachment.

Explanation:

Please check the attachment.

Download xlsx
5 0
3 years ago
Can I have help on this
never [62]

the answer is the seconf one


6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is the best definition of a workplace policy?
    13·2 answers
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • Is downloading like installing?
    13·1 answer
  • What application service allows you to decouple your infrastructure using messaged based queues?
    10·1 answer
  • What are the different types of application architecture
    5·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • What is the output?
    7·1 answer
  • Here is what my rob-lox user USED to look like, btw what is better, Samsung or apple?
    13·2 answers
  • State the Limitations of the first generation of computers​
    8·1 answer
  • Tim is a project manager. He is brainstorming with his team about problems that could arise during the next phase of the project
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!