The ________ field is the common field that is used to join with a primary key field in another table

A) secondary key B) foreign key C) key indicator D) key marker

B

Computer Science & Information Technology

You might also like to view...

A ________ enables individuals to select from a list or to type a value

A) menu box B) combo box C) list box D) label box

Computer Science & Information Technology

The type of hacking that involves breaking into telephone systems is called sneaking

Indicate whether the statement is true or false.

Computer Science & Information Technology