1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
6

Nicole wants to create a database to collect information about sales transactions. She would like to use the database to look up

customer names and sales prices if they return a product. She would also like to retrieve their credit card number in order to reimburse them. In addition, she would like to sort the items in the database by product number. What fields should she have in her database?
A.product number, product description, and sales price
B.product description, sales price, and employee name
C. last name, first name, telephone number, and address
D. name, credit card number, product number, and sales price
Computers and Technology
2 answers:
arlik [135]3 years ago
6 0

The correct answer is: D. name, credit card number, product number, and sales price

Although the database would have all the fields that she would need, it would still be better if the NAME field would be split into 2 or 3 parts. This is a practice that is done in the industry to keep information more clear as there are a couple of cases where people change their names due to different reasons.

Snowcat [4.5K]3 years ago
3 0
D. name, credit card number, product number, and sales price
You might be interested in
In a database, __________ is used to uniquely identify each record for retrieval or manipulation. answer an attribute or a field
spayn [35]
Hello <span>August1859 
</span>
Answer: In a database, a key field is used to uniquely identify each record for retrieval or manipulation.

Hope This Helps!
-Chris
8 0
3 years ago
Which of the following commands would I use to begin a new presentation?
ki77a [65]

Answer:

begin >new

Explanation:

just trust me ok hehe

7 0
4 years ago
Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then prel
lukranit [14]

Answer:

SuperFetch

Explanation:

Superfetch is a memory management technique on windows service that enables or fetch frequently use applications on systems and launch them faster because the frequently use applications has been preload into the system memory for easy access when they want to be used.

SuperFetch always takes notice of all application running on your system in which when you exit a frequently used application SuperFetch will preload them immediately since it is saved on the system memory.

One of the most important part of Superfetch is that it saves alot of time because you don't have to search the applications before you get access to them in as far as the application was frequently used.

5 0
3 years ago
Identify the three fuzzy logic systems in the given text.
Furkat [3]

Answer:

she is the both city CAA been Van from is next

4 0
3 years ago
Curtis has been testing a new software package for the past two months. However, he decides not to switch and goes back to using
hodyreva [135]
Retro-active interference
8 0
4 years ago
Other questions:
  • The left column values in a table array are called table ____
    13·1 answer
  • A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
    15·2 answers
  • What are the benefits of using a multiview sketch to communicate a design?
    11·1 answer
  • PLZ HELP ME! What is a false statement about online time?
    9·1 answer
  • What is meant by encapsulating semaphores? Bring out the need for it
    12·1 answer
  • Mobile devices need to work within limited screen space ? true or false
    9·2 answers
  • Someone asks you for help with a computer that hangs at odd times. You turn it on and work for about 15 minutes, and then the co
    10·1 answer
  • A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
    14·1 answer
  • A simulation system is a technology that enables you to take over a customer’s screen, mouse, or other connected device in order
    13·1 answer
  • Complete the add repair method!<br> (Will give the brainiest)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!