A social security number is commonly used as a ________ key
A) primary
B) foreign
C) super
D) secondary
Answer: A
Computer Science & Information Technology
You might also like to view...
Which hardening tool can be used to identify if file tempering has occurred?
a. chroot b. TCP Wrapper c. Tripwire d. Logging
Computer Science & Information Technology
You can stop an endless loop by clicking Debug on the menu bar, and then clicking ____.
A. Stop Debugging B. Cancel Debugging C. Abort Debugging D. End Debugging
Computer Science & Information Technology