?
Critical Thinking Questions
Case 9-2
?
Emily is functioning with her customer, Anna, on the design of a new database. She describes to Anna that key fields are utilized to access, coordinate, and preserve the data records.
?Anna asks if it is manageable to fetch records using a field or combination of fields that is not unique. Emily tells her that it is possible using one type of key. Identify the type of key used here.
A. ?Primary key
B. ?Secondary key
C. ?Foreign key
D. ?Super key
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following can be used to help ensure that all devices have the requisite security?
A. SOE B SLA C. MOU D. ICA
Computer Science & Information Technology
A derived class cannot directly access public members of a base class.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology