1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
15

20 POINTS AND BRAINLIEST TO CORRECT ANSWER

Computers and Technology
2 answers:
DaniilM [7]3 years ago
4 0
D. The Sr. No.
This is because the primary key must contain a unique value for each row of data.
Art [367]3 years ago
3 0

Answer:

D) Sr. No is right for Plato

Explanation:

PLATO GANG

You might be interested in
Recent trends on operating system
katovenus [111]

Answer:

Windows 10 if this is what I think u mean

7 0
2 years ago
Show the output waveform of an AND gate with the inputs A, B,
NeX [460]

Answer:

Please see the attached image

Explanation:

6 0
2 years ago
Why was the 80s bad for Disney i know one example but ill tell you after you answer
Bond [772]

Answer:

The dark stories behind it? i dont  know lol

5 0
2 years ago
Secondary storage is also called?
Alekssandra [29.7K]

it is also called external storage

4 0
3 years ago
Which of the following are true of e-mail communications when compared to phone or face-to-face communications?
ollegr [7]
They would be easily shared, from what I believe
7 0
2 years ago
Read 2 more answers
Other questions:
  • What is looping in QBASIC​
    9·1 answer
  • Stuff that's displayed on a web page (Has to be 7 characters) (third letter is N, and fifth letter is E) little urgent
    14·1 answer
  • Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer syste
    7·1 answer
  • The term "exception propagation" means:
    5·1 answer
  • Which line in the following program will cause a compiler error? 1 #include 2 using namespace std; 3 int main() 4 { 5 int number
    12·1 answer
  • Alexi is writing a program which prompts users to enter their age. Which function should she use?
    6·2 answers
  • An agile team has which two characteristics? (choose two. ).
    10·1 answer
  • Every time a key is pressed on the keyboard, the _______________ chip in the keyboard notices which key has been pressed.
    13·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
  • which of the following is not a driver of wireless growth? group of answer choices universal access to information and applicati
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!