1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
2 years ago
6

Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c

redit if it is for 1 semester and 1 credit if it is for 2 semesters. Which field should Rob assign as a primary key in the table?
Computers and Technology
2 answers:
Digiron [165]2 years ago
7 0
As a<span> </span>primary key<span> is a field in a table which uniquely identifies each row/record in a database table, then the advisable field for the primary key in here should be the Course_ID. That is very unique in that table</span>
gavmur [86]2 years ago
7 0

Answer:

Course_ID should be made the primary key

Explanation:

For a field to be made a primary key, the following among other things, should hold;

1. It must be unique: It cannot contain duplicates. Every row/entry has a different value of the field. Course_ID satisfies this condition. Every course has their own different ID. Course_Name may also satisfy this condition. Every course may have their own separate name. Other fields do not satisfy this condition. One or more courses may be taken in the same semester and may also have the same credit unit.

2. It must not be null: For a field to be made a primary key, it must not contain null values. All fields satisfy this condition though.

3. It must not change over time: A field that could be changed so frequently should not be made a primary key. Among all the fields listed, only Course_ID completely satisfy this condition. Course_ID cannot be easily or frequently changed. There are higher chances that other fields change anytime.

4. Preferably numeric: Numeric fields are better used as primary key so that certain rules could be applied to automatically generate them. For example, one might create a rule that auto increments the field dynamically. Course_ID satisfies this condition.

Hope this helps!

You might be interested in
Which of the following is defined as the elastic leasing of pooled computer resource over the Internet? 1) Broadband 2) Wiki 3)
garri49 [273]

The cloud is defined as the elastic leasing of pooled computer resource over the Internet.

Many companies currently use the cloud to store their information and infrastructure instead of leaving it on the physical computer. As time passes, more companies have continuously started to store their information on the cloud. Predictions show that in the future, nearly all companies will use this to store information.

7 0
3 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
ss7ja [257]

Answer:

Brute Force attack.

Explanation:

A network is a platform where end user devices like computers are connected to communicate and share resources. There are public networks and private networks.

A public network has its end devices and servers configured with a public IP address, which is routable on the internet, while private networks uses private IP addresses which can be used on the internet.

Private networks can be made accessable to public users by configuring an authentication and authorization policy, which could be one or a multi factor authentication. These requires a password and other factors to access the services of a private network.

An attacker can easily access a one factor or a password accessible user account, if the password is weak by using the process called a brute Force attack.

The brute Force attack exploits the vulnerability of weak passwords by entering possible valid combination from a defined set of possibilities.

6 0
3 years ago
What is the name of a button on a website?
zhuklara [117]
May I know which button?
5 0
3 years ago
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and
makvit [3.9K]

Answer:

subnet mask

Explanation:

A subnetwork or subnet mask is a logical subdivision of an IP network.

To find out your subnet mask, the simlest way around it is to is to run a simple command line in windows.

Simply press the Windows key and “R” at the same time to open the command prompt and type “cmd” followed by “enter.” This will allow you to see your subnet mask.

In IPv4, the subnet mask 255.255. 255.0 is 32 bits and consists of four 8-bit octets. The address: 10.10. 10.0 subnet mask 255.255.255.0 this simply indicated that the subnet mask consists of a range of IP addresses from 10.10.10.0 - 10.10.10.255.

Subnet masks (IPv4) are often involved in identifying the range of IP addresses that make up a subnet, it can also be described as a group of IP addresses on the same network.

7 0
3 years ago
Using Sequential Search on an array of size n, the search key is definitely present in the array. The probability of matching th
MissTica

Answer:

(11n-5) / 12 is correct answer.

Explanation:

The Probability that key will match to nth term = 1/2

The Probability that key will match to n-1th term = 1/3

As all other probabilities are equal

The Total Probability that key matches to any of 1 to n-2 index = 1 - 1/2 - 1/3 = 1/6

The Probability that key matches to any of 1 to n-2 index = (1/6) / n-2 = (1/6)* (n-2))

Let P(i) = Probability that key matches to ith index.

The Average time complexity = 22 i=1 P(i) * i

The Average time complexity = 1/(6(n-2) * ( sum of 1 to n-2 ) + (n-1) / 3 + n/2

The Average time complexity = 1/(6(n-2) * ( n-2)*(n-1) / 2 + ( n-1) / 3 + n/2

The Average time complexity = 1/6 * (n-1)/2 + (n-1)/3 + n/2

The Average time complexity = (n-1)/12 + (n-1)/3 + n/2

The Average time complexity = (n-1 + 4 * n - 4 * 1 +6 * n)/12

The Average time complexity = 11n-5 / 12

so (11n-5) / 12 is correct answer.

7 0
3 years ago
Other questions:
  • How do open online courses help with independent learning? (1 point)
    13·2 answers
  • The Microsoft-NanoServer-Guest-Package installs the drivers necessary for installing Nano Server as a host OS on a physical mach
    15·1 answer
  • You are manually configuring a tcp/ip host. another administrator gives you the router's ip address. what is the tcp/ip term for
    6·2 answers
  • What are some of the causes for error 1921 when updating?
    11·2 answers
  • Why is it important for software developers to study Human-Computer Interaction? to make sure a user interface is easy to use, w
    10·2 answers
  • __________ can be used to replace internal network addresses with one or more different addresses so the traffic that actually t
    9·1 answer
  • Can someone help please
    12·1 answer
  • What is virtualization?
    11·2 answers
  • Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write yo
    8·1 answer
  • B) The company's chief financial officer recognizes the need for an upgrade to the smart watches, but does not understand why th
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!