A social security number is commonly used as a ________ key

A) primary
B) foreign
C) super
D) secondary

Answer: A

Computer Science & Information Technology

You might also like to view...

Which hardening tool can be used to identify if file tempering has occurred?

a. chroot b. TCP Wrapper c. Tripwire d. Logging

Computer Science & Information Technology

You can stop an endless loop by clicking Debug on the menu bar, and then clicking ____.

A. Stop Debugging B. Cancel Debugging C. Abort Debugging D. End Debugging

Computer Science & Information Technology