1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leno4ka [110]
3 years ago
9

Which statements are true about a database?

Computers and Technology
2 answers:
anzhelika [568]3 years ago
6 0

Answer:

you cannot leave a field empty

you can enter data based on the defined data type

OverLord2011 [107]3 years ago
5 0

Answer:

You can enter data based on the defined data type.

A primary key uniquely identifies a record.

Explanation:

In a database, you can only enter data that matches the data type you have specified for that field. Therefore, you can enter text in fields with the text data type; numbers in fields with the number data type; or images in fields with the BLOb data type. You can have fields where data entry is optional. A primary key eliminates the chance of duplicate entries of the same record in a table.

You might be interested in
(10 points) A stopwatch has three states named Zero, Running, and Stopped. There are two buttons, named B1 and B2. For each butt
solniwko [45]

Answer:

see explaination

Explanation:

State Diagram based on given in the problem and state table, k-map for j and k, based j and k expressions we can draw the (FSM )controller using j and j flip flop.

see attachment for this.

6 0
3 years ago
Consider the given choices and determine which one establishes a conceptual framework for network connectivity.
Snezhnost [94]

Of the given choices, the option that establishes a conceptual framework for network connectivity is OSI model.

<h3>What is network connectivity?</h3>

Network connectivity is a term that tells more about the process of connecting different areas of a network to each other.

Conclusively, the OSI Model often called Open Systems Interconnection Model is known to be the conceptual framework that tells the functions or duties of a networking system.

Learn more about  network connectivity from

brainly.com/question/26956118

5 0
2 years ago
Nancy needs to find the average of two numbers in the middle from an even count of numbers arranged in descending order. which s
Rus_ich [418]

i would say e. the median

7 0
3 years ago
Read 2 more answers
This is due in like an hour but I'm confused so please do lend assistance
blagie [28]
Yes you do have to program it first.
4 0
3 years ago
Mark used the Cover Page gallery in Word to insert a cover page in his report but now he wants to delete it. To do so, he should
Minchanka [31]

Answer:Remove Current Cover Page

Explanation:

Remove Current Cover Page  is the option that is particular for removing or deleting the present cover page from the Word. It can be removed if another cover page is required to put up or cover page is mistakenly inserted.

  • This option is present in Insert tab.It contains Cover Pages in Pages Group to vanish current cover page
  • According to the question,Mark should use Remove Current Cover Page  option from Pages group to eliminate the cover page that he does not want anymore in his report.  
5 0
3 years ago
Other questions:
  • If there is more than one speaker, how should they be all noted?
    9·1 answer
  • What are some of the good effects of social media
    7·1 answer
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    5·1 answer
  • Quiero borrar mi cuenta como le hago ?
    6·1 answer
  • Anyone knows how to do this??
    13·1 answer
  • Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
    12·2 answers
  • Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s
    5·2 answers
  • Write c++ program from 1to 100 to find prime numbers using statement.<br><br>please help me​
    15·1 answer
  • what is the reason for assigning the management of file sharing, security, and quotas to administrators . why would it be pruden
    12·1 answer
  • Weak passwords are a(n) ___________ threat
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!