Which of the following is used to uniquely identify records in a table?

(A) a Rule of Referential Integrity
(B) a foreign key
(C) a primary key
(D) a relational database

(C) a primary key

Computer Science & Information Technology

You might also like to view...

The total number of times a module calls itself recursively is known as the __________ of recursion.

a. height b. weight c. time d. depth

Computer Science & Information Technology

Microsoft uses a service called Safe Browsing to alert users about sites to avoid.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology