A primary key can consist of ___________ column(s).

a. one or more
b. one
c. two
d. zero

a. one or more

Computer Science & Information Technology

You might also like to view...

Privacy violations take place only when you distribute your personal information over the Internet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In a linked list, the link component of each node is a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology