1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
6

Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c

redit if it is for 1 semester and 1 credit if it is for 2 semesters. Which field should Rob assign as a primary key in the table?
Computers and Technology
2 answers:
Digiron [165]3 years ago
7 0
As a<span> </span>primary key<span> is a field in a table which uniquely identifies each row/record in a database table, then the advisable field for the primary key in here should be the Course_ID. That is very unique in that table</span>
gavmur [86]3 years ago
7 0

Answer:

Course_ID should be made the primary key

Explanation:

For a field to be made a primary key, the following among other things, should hold;

1. It must be unique: It cannot contain duplicates. Every row/entry has a different value of the field. Course_ID satisfies this condition. Every course has their own different ID. Course_Name may also satisfy this condition. Every course may have their own separate name. Other fields do not satisfy this condition. One or more courses may be taken in the same semester and may also have the same credit unit.

2. It must not be null: For a field to be made a primary key, it must not contain null values. All fields satisfy this condition though.

3. It must not change over time: A field that could be changed so frequently should not be made a primary key. Among all the fields listed, only Course_ID completely satisfy this condition. Course_ID cannot be easily or frequently changed. There are higher chances that other fields change anytime.

4. Preferably numeric: Numeric fields are better used as primary key so that certain rules could be applied to automatically generate them. For example, one might create a rule that auto increments the field dynamically. Course_ID satisfies this condition.

Hope this helps!

You might be interested in
45 points!!
pav-90 [236]

Answer:

ENQUIRE database system

Explanation:

5 0
3 years ago
Read 2 more answers
Which amendment to the Constitution ended slavery in the United States?
KonstantinChe [14]
<span>The amendment to the constitution which ended slavery in the United States of America is the thirteen amendement. The correct option is B. The thirteen amendment forbades slavery and involuntary servitude in United States of America. The amendment was passed at the end of the civil war.</span>
4 0
3 years ago
Is it possible build a real time machine?
Helga [31]

Answer:

Travelling in time might sound like a flight of fancy, but some physicists think it might really be possible. BBC Horizon looked at some of the most promising ideas for turning this staple of science fiction into reality.

Explanation:

7 0
2 years ago
Read 2 more answers
When storing used oil, it needs to be kept in ___________ containers.
tester [92]

Answer:

Plastic container

Explanation:

because if we use iron it may rust and oil may also damage

5 0
2 years ago
The point at coordinates (2, -18) is in what direction from the origin?
laila [671]
On a graph, move 2 spaces to the right and from there move 18 spaces down. Now, where you've ended, make a dot. The distance fro the origin is -2/18 (as a fraction).
4 0
3 years ago
Other questions:
  • What does xhtml stand for?
    5·2 answers
  • What's the best option if you can't show your PowerPoint presentation at all? A. Create PDF/XPS Document B. Prepare a Package Pr
    11·2 answers
  • WHICH OF THE FOLLOWING LOOKS JUST LIKE A CD ROM BUT CAN STORE MUCH MORE INFORMATION
    8·2 answers
  • What does a graphic organizer do
    6·1 answer
  • A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged
    5·1 answer
  • ______ is an example of unauthorized access to your computer or accounts.
    14·1 answer
  • You are creating a database for your computer club. Most of the students live in your town, Durham. How can you make Durham appe
    11·1 answer
  • What are the three basic classes of application
    14·2 answers
  • Which device allows you to convert sounds into digital format to be used on the computer​
    8·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!