The ________ field is the common field that is used to join with a primary key field in another table
A) secondary key B) foreign key C) key indicator D) key marker
B
Computer Science & Information Technology
You might also like to view...
A ________ enables individuals to select from a list or to type a value
A) menu box B) combo box C) list box D) label box
Computer Science & Information Technology
The type of hacking that involves breaking into telephone systems is called sneaking
Indicate whether the statement is true or false.
Computer Science & Information Technology