Which of the following is used to uniquely identify records in a table?
(A) a Rule of Referential Integrity
(B) a foreign key
(C) a primary key
(D) a relational database
(C) a primary key
Computer Science & Information Technology
You might also like to view...
The total number of times a module calls itself recursively is known as the __________ of recursion.
a. height b. weight c. time d. depth
Computer Science & Information Technology
Microsoft uses a service called Safe Browsing to alert users about sites to avoid.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology