1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
3 years ago
10

You create a database that stores data in tables that consist of rows and columns. each row has a primary key, and each column h

as a unique name. which data model did you use
Computers and Technology
2 answers:
denis-greek [22]3 years ago
6 0

For data models in the primary key column use an integer with the auto-increment condition.

For data models in the columns afterward can use string, date, etc.

<h2>Further explanation </h2>

Data is a collection of information or information from a matter obtained through observation or also searching for certain sources. The data obtained can be an assumption or fact because it has not been processed further. Because it is then processed through research or experimentation, such data can become more complex forms such as a database, information or even a solution to solve a particular problem.

Data is divided into several types, namely:

  • Primary Data, i.e. data obtained or collected by the person doing the research or concerned who needs it.
  • Secondary Data, which is data obtained or collected from existing sources.
  • Quantitative data, quantitative data is data in the form of numbers or qualitative data that is leveraged.
  • Data according to the time of collection, data according to the time of collection is data collected from time to time to provide an overview of the development of an activity.

Learn more

definitions of data brainly.com/question/9530555

data models brainly.com/question/9530555

Details

Class: College

Subject: Computer and Technology

Keywords: data, column, blood

jeyben [28]3 years ago
3 0
The answer is a relational database.

A data model in database management system consists of rules that define how the DB organizes data. Today, a relational database is widely used. It is a collection of data items organized as a set of formally described tables from which data can be accessed in many different ways.



You might be interested in
When youre working with a word processing document and you press the Del key what happens
REY [17]
Typically, "Del" stands for "delete."
Most times, this key will do different things depending on the type of keyboard/computer you have. For example, on macs, the "delete" key is also the backspace key, so it will delete the last character you typed. However, on most pcs, the "delete" key will delete characters you typed that are in front of your cursor.
5 0
3 years ago
Wanna play pubg<br><br><br>ill send u my id​
Nikitich [7]
My sister would what’s your id
6 0
2 years ago
Read 2 more answers
HURRY PLEASE ITS A TEST
laiz [17]

<em>A.)</em>

<em>It's either A or D both of them stand out and make sense to me so I think that it'll be right if you choose A or D.</em>

<em>-Ɽ3₮Ɽ0 Ⱬ3Ɽ0</em>

8 0
3 years ago
You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond t
babymother [125]

Answer:

The blocking system.

Explanation:

In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.

For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.

By this way, there won´t be any duplicated actions or reponses.

5 0
3 years ago
Which of the following describes the phishing method of information security crime?
Marianna [84]
<span>C. pretending to be someone else when asking for information</span>
3 0
2 years ago
Read 2 more answers
Other questions:
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
    6·2 answers
  • La computadora es un medio de comunicacion moderno?
    8·1 answer
  • Fourlotts Corp. provide integrated services that include storing manufactured goods, packaging, and delivering it to the dealers
    13·1 answer
  • Application software can run without the presence of system software true or false ​
    5·1 answer
  • You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?
    10·1 answer
  • I need it in code please (python)
    15·2 answers
  • Which is the fastest memory in computer​
    9·2 answers
  • when demonstrating 2022 altima’s parking assistance, what steering feature should you mention when pointing out how easy the veh
    10·1 answer
  • Who is the best nfl team in your mind
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!