answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
1 year ago
6

Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c

redit if it is for 1 semester and 1 credit if it is for 2 semesters. Which field should Rob assign as a primary key in the table?
Computers and Technology
2 answers:
Digiron [165]1 year ago
7 0
As a<span> </span>primary key<span> is a field in a table which uniquely identifies each row/record in a database table, then the advisable field for the primary key in here should be the Course_ID. That is very unique in that table</span>
gavmur [86]1 year ago
7 0

Answer:

Course_ID should be made the primary key

Explanation:

For a field to be made a primary key, the following among other things, should hold;

1. It must be unique: It cannot contain duplicates. Every row/entry has a different value of the field. Course_ID satisfies this condition. Every course has their own different ID. Course_Name may also satisfy this condition. Every course may have their own separate name. Other fields do not satisfy this condition. One or more courses may be taken in the same semester and may also have the same credit unit.

2. It must not be null: For a field to be made a primary key, it must not contain null values. All fields satisfy this condition though.

3. It must not change over time: A field that could be changed so frequently should not be made a primary key. Among all the fields listed, only Course_ID completely satisfy this condition. Course_ID cannot be easily or frequently changed. There are higher chances that other fields change anytime.

4. Preferably numeric: Numeric fields are better used as primary key so that certain rules could be applied to automatically generate them. For example, one might create a rule that auto increments the field dynamically. Course_ID satisfies this condition.

Hope this helps!

You might be interested in
What elements of SANS 20 you could leverage to reduce the TCP/IP vulnerabilities of your workstation
Vlada [557]

Answer:

- limitation and control of network ports, protocols and services.

- Continuous vulnerability assessment and remediation.

Explanation:

The TCP or transmission control protocol is a layer 4 protocol (transport), that reliably transports packets in sequential segments to an application in the destination computer, using the ip address and the port number of the application.

The ICMP sent during the TCP/ip activities, can render the network vulnerable to attacks. limitation and control of the network ports, protocols and services and continuous assessment would mitigate the vulnerability of the TCP/ip model.

5 0
1 year ago
What advantage do ExpressCard modules and USB adapters offer over expansion cards?
ss7ja [257]
<span>ExpressCard modules and USB adapters are faster and smaller. They are easier to plug into a computer and allow a person to add memory, wired and wireless communications, multimedia, and security features by inserting the small card or adapter into a small slot in the computer.</span>
3 0
1 year ago
Write a boolean method that checks whether a given positive integer n is a perfect square. Use Math’s sqrt and round methods to
svetoff [14.1K]
In java...

public boolean checkSquare(int n){

int actualNumber = n;
int squareRoot = (int)Math.sqrt(n);
int squaredNumber = Math.pow(squareRoot,2);

if(squaredNumber==actualNumber){
return true;
} else {
return false;
}

}
5 0
1 year ago
Megan has written the following rough draft for her assignment. Choose the correct way to complete each sentence. Sarah is creat
atroni [7]

Answer:

I. hatching

II. filter

Explanation:

Sarah is creating an image. She wants to achieve tonal effects with parallel lines by varying their densities and distribution patterns. She will use <u>hatching</u> to do this. She also wants to add special effects on the image. Therefore, she will use <u>filters</u>.

Hatching refers to an art technique in which parallel lines are used to shade by drawing them closely together.

Stippling is an art technique used in the making of patterns by using small dots.

Filters is a technique of changing image characteristics. It is used to change the picture characteristics & to add special effects to an image such as the shade, contrast, tone, brightness etc.

We therefore see that, <u>hatching</u> and <u>filter</u> are the correct answers respectively

3 0
2 years ago
A program is loaded into _________ while it is being processed on the computer and when the program is not running it is stored
erik [133]
Idkkkkkkkkkkkkkkkkkkk
4 0
1 year ago
Read 2 more answers
Other questions:
  • Two career fields that lack minority professionals and thus offer many grant opportunities to students are education and _____.
    10·2 answers
  • The term drive app is used to describe applications stored on a computer true or false
    11·2 answers
  • Annabeth has been using a public cloud to store and access her documents. Which drawback of a public cloud should she be aware o
    11·1 answer
  • A good website design combines which of the following elements? (select all that apply) powerful web server hardware components
    9·2 answers
  • Someone else can drive your car if _____.
    12·2 answers
  • In this exercise, you will create a couple of helper methods for ArrayLists in a class called ArrayListMethods.
    10·1 answer
  • Write a function string middle(string str) that returns a string containing the middle character in str if the length of str is
    13·1 answer
  • In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain ord
    11·1 answer
  • Pick a 3D game you enjoy or know about. Pick a scene from that game that has at least one character in it and describe the scene
    9·1 answer
  • Which of the following are true statements about the data that can be represented using binary sequences?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!