1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alla [95]
4 years ago
5

ASAP PLZ!!!!!!!!!! Type the correct answer in the box. Spell all words correctly. What is the function of primary keys? Primary

keys facilitate because they act as unique identifiers.
Computers and Technology
2 answers:
DaniilM [7]4 years ago
8 0

Answer:

It is important because it helps you link your table to other tables (relationships) using primary key as links. Primary keys also provide a means to specifically and uniquely identify a row of data (or record) in a table when building access database

Explanation:

valina [46]4 years ago
6 0

Answer:

What is the function of primary keys? Primary keys facilitate searching and sorting because they act as unique identifiers.

Explanation:

In Database Managements Systems, a key is a field in a database that is used to sort, identify or retrieve records in a relation table. A Primary key is column or group of columns used to uniquely identify each row on a table, and the same value cannot be repeated on the table. This makes it very easy and fast to retrieve data without having to search each row in the database.

You might be interested in
Suppose there are 69 packets entering a queue at the same time. Each packet is of size 7 MiB. The link transmission rate is 1.7
svp [43]

Answer:

69.08265412 milliseconds

Explanation:

Lets first convert 7 MiB to bits

7*1024*1024*8=58720256 bits

Now convert bits to Gbits

58720256/10^{9}  =0.058720256 Gbits

Queuing Delay = Total size/transmission link rate

Queuing Delay= \frac{0.058720256}{1.7} =0.03454132706 seconds

Delay of packet number 3 = 0.03454132706*2=0.06908265412 seconds

or 0.06908265412= 69.08265412 milliseconds

7 0
4 years ago
Hamish has created a website with an online booking system for his salon appointments. He wants to engage more with his customer
zubka84 [21]

Answer:

  1. Gather customer feedback: Email Survey
  2. Tell customers about the extended opening hours: Social Media Page
  3. Show customers Hamish’s latest hair looks: An online gallery
  4. Help customers find the new salon: A map

Explanation:

1. By sending a questionnaire or survey via email, Hamish can gather customer feedback. Customers can answer these questionnaires directly in attached questions. They can also give feedback over email. Email survery is an economical way to collect feedback and can be sent to a many customers at the same time.

2. Hamish can tell customers about opening hours by a Social Media Page is a mean to assist social media accounts through QR Codes. He can update with his salon information via this web page. When customers scan can see salon's logo, information etc on this page in order to follow.

3. Hamish can display his latest hair looks through an online gallery by sharing his photos to many people. These images are stored, organized  displayed and shared on the website (online gallery). This is a better option than using expensive albums and hard copies.

4. Hamish can help customers to find a new salon by providing a map on his website. This makes easier for customers to locate the new salon as map provides with the navigation information. Customers can get a route  from their current location to the salon.

5 0
3 years ago
You have one address, 196.172.128.0 and you want to subnet that address. You want 10 subnets. 1. What class is this address
Korvikt [17]

Answer:

This address is by default a class c network

Explanation:

This IP address in this question is a class c network because it has 196 as its first octet. A class c network is one which has its first octet to be between 192 and 223. the class c network begins with a 110 binary.  If ip is between 192 to 223 it belongs to this class. These first 3 octets are the representation of the network number in the address. Class c's were made to support small networks initially.

8 0
3 years ago
Describe two benefits of the community of replacing the printed copy with an online version.
DiKsa [7]

Answer:

less costs

Explanation:

saves more money

easy to use for everyone

6 0
3 years ago
A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order
Novosadov [1.4K]

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

3 0
3 years ago
Other questions:
  • While reviewing some web page code, you notice that the html is written in all lowercase letters. you are not sure which version
    14·1 answer
  • C++ what is wrong with my equation?
    10·1 answer
  • Compare and contrast fair use to copyright.
    5·1 answer
  • LAB: Even/odd values in an array
    9·2 answers
  • The getting started screen in Microsoft publisher consists of which main parts?​
    7·1 answer
  • Which is the fastest CPU and why?
    5·1 answer
  • To all paladins players out there!!!!!
    14·1 answer
  • 3. Comparing the Utopian and dystopian views of Technology according to Street (1992) which one in your view is more applicable
    14·1 answer
  • Create a mobile app plan using PowerPoint slides to show mock-ups of screens,
    6·1 answer
  • Where can i check on an acer chromebook to see what version of java is installed.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!