1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
15

NEED HELP WILL MARK BRAINIEST AND 100 POINTS FOR ANSWER!!!!What is an example of a composite key in a database table?

Computers and Technology
2 answers:
MrRissso [65]3 years ago
6 0
The customerID would probably be the answer.
fgiga [73]3 years ago
5 0

Answer:

cusomerid

Explanation:

You might be interested in
The application window controls include: minimize, maximize, and close<br><br> A) true <br> B) false
Arlecino [84]

Answer:

True

Explanation:

Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.

6 0
3 years ago
Which two technologies support the building of single-page applications? and are two technologies helpful in building single pag
Sholpan [36]

Answer:

You can use JavaScript, HTML, PHP and so forth.

Explanation:

7 0
4 years ago
Operating systems of mobile devices can support full scale software programs like microsoft word or excel
aliya0001 [1]
Iit is microsoft word
5 0
4 years ago
Which option correctly identifies the expense that will cost you the most when you are living on your own?
larisa86 [58]
Cccccccccccccccccccccc
5 0
4 years ago
Images from your .............. can be copied and pasted in a folder on your computer ​
Alenkasestr [34]

I think the answer is document

7 0
3 years ago
Other questions:
  • “When using a public computer for browsing the Internet, try to use for 1.________ transactions. Also, use 2.__________ browsing
    10·2 answers
  • What is the use of html in websites
    15·2 answers
  • Paula needs to ensure that an animation she has created is repeated. Which option should she use to achieve this?
    6·1 answer
  • In a brief essay explain the security vulnerabilities of transition methods (6to4, etc.)
    8·1 answer
  • In which area is composing for games similar to composing for
    14·1 answer
  • 20. Modifying a report is easiest from what view. O A. Report O B. Layout O C. Print O D. Design
    14·1 answer
  • Does anyone know how to do Python Essentials 5.7.1.6 because i am completely lost
    5·1 answer
  • A local firewall adds protection to a hardware firewall by protecting a device _______. Select all that apply. WILL GIVE BRAINLI
    6·2 answers
  • A camera on a tripod shows the ground floor of a skyscraper and then moves upward to show its entire length. what camera movemen
    12·1 answer
  • True or false: Securing intellectual property digitally is the only security because that's how all IP is stored.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!