menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

Primary key a. procedures that keep data current b. item that contains data, as well as the actions that read or process the data c. field that uniquely identifies each record in a file d. process of comparing data with a set of rules or values to determine if the data meets certain criteria e. language instructions, or code, to be converted to machine language f. machine language version of a program that results from compiling the procedural language g. number(s) or character(s) that is appended to or inserted in a primary key value h. specifies the kind of data a field can contain and how the field is used i. problem that occurs when one activity has led to another that was not planned originally, causing the project to grow in scope j. sets of rules and procedures an organization expects employees to accept and follow

BuyFindarrow_forward

Enhanced Discovering Computers 201...

1st Edition
Misty E. Vermaat + 4 others
Publisher: Cengage Learning
ISBN: 9781305657458

Solutions

Chapter
Section
BuyFindarrow_forward

Enhanced Discovering Computers 201...

1st Edition
Misty E. Vermaat + 4 others
Publisher: Cengage Learning
ISBN: 9781305657458
Chapter 11, Problem 2M
Textbook Problem
1 views

Primary key

  1. a. procedures that keep data current
  2. b. item that contains data, as well as the actions that read or process the data
  3. c. field that uniquely identifies each record in a file
  4. d. process of comparing data with a set of rules or values to determine if the data meets certain criteria
  5. e. language instructions, or code, to be converted to machine language
  6. f. machine language version of a program that results from compiling the procedural language
  7. g. number(s) or character(s) that is appended to or inserted in a primary key value
  8. h. specifies the kind of data a field can contain and how the field is used
  9. i. problem that occurs when one activity has led to another that was not planned originally, causing the project to grow in scope
  10. j. sets of rules and procedures an organization expects employees to accept and follow

Program Description Answer

Primary key is a key that is used to identify the particular record in a relational database in a unique way.

Hence, the correct option is “C”.

Explanation of Solution

Primary Key:

  • The value of primary key should be unique for each row of a table.
  • The columns that is set as primary key cannot contain duplicate values.
  • In some relational table, a single attribute can be a primary key.
  • Eg: Table Name: Employee
Emp_IdEmp_NameEmp_Age
01xxx26
02yyy28
03yyy27
04zzz26
  • In the above table,
    • The value “yyy” of the column “Emp_Name” is repeated two times...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 11 Solutions

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Show all chapter solutions
add
Ch. 11 - Explain how you access data in a web database....Ch. 11 - Identify uses of web databases for government,...Ch. 11 - A(n) _____ defines how users view the organization...Ch. 11 - List possible uses of an object-oriented database.Ch. 11 - Explain the characteristics, sources, and uses of...Ch. 11 - Describe the role of the database administrator.Ch. 11 - Define the term, data dictionary. Explain how a...Ch. 11 - A(n) _____ is a request for specific information...Ch. 11 - List steps to import and export data between a...Ch. 11 - Define the terms query language, SQL, and QBE.Ch. 11 - Define the terms, form and report writer.Ch. 11 - Explain how access privileges contribute to data...Ch. 11 - Explain issues surrounding accidental access of...Ch. 11 - List methods to restore or backup a database....Ch. 11 - Identify the five phases in the SDLC. Name three...Ch. 11 - Identify who participates in system development....Ch. 11 - Define the term, project management. List elements...Ch. 11 - Define the function of project management...Ch. 11 - Describe how Gantt and PERT charts are used.Ch. 11 - Define the terms, scope creep and change...Ch. 11 - Identify tests used to evaluate feasibility of a...Ch. 11 - Describe ways that team members collaborate.Ch. 11 - Identify data and information gathering...Ch. 11 - Describe circumstances that can initiate system...Ch. 11 - List the four activities of the planning phase....Ch. 11 - Describe the activities of the analysis phase....Ch. 11 - Explain security issues surrounding outsourcing.Ch. 11 - List the two activities of the design phase....Ch. 11 - Differentiate among an RFQ, RFP, and RFI. Describe...Ch. 11 - Explain what occurs when vendor proposals are...Ch. 11 - Explain the activities and users involved in the...Ch. 11 - List the four activities of the implementation...Ch. 11 - List the three activities of the support and...Ch. 11 - Define the following terms: programming language,...Ch. 11 - Explain issues surrounding colleges teaching...Ch. 11 - Define the terms, procedural language, compiler,...Ch. 11 - Describe the following: 4GLs, classic programming...Ch. 11 - List steps to publish a webpage. Explain how web...Ch. 11 - Explain how the sports industry uses technology.Ch. 11 - In a data hierarchy, each higher level of data...Ch. 11 - A check digit often confirms the accuracy of a...Ch. 11 - In a typical database system, each department or...Ch. 11 - In a file processing system, duplicated data can...Ch. 11 - Many programs today use forms on a webpage as...Ch. 11 - File processing systems require more memory,...Ch. 11 - To retrieve or select data in a database, you...Ch. 11 - Unlike a form, you use a report writer only to...Ch. 11 - One way to secure a database is to allow only...Ch. 11 - In a rollforward, the DBMS uses the log to undo...Ch. 11 - Gantt charts are better suited than PERT charts...Ch. 11 - The planning phase begins when the steering...Ch. 11 - A(n) _____ check tests data in two or more...Ch. 11 - Which of the following is not an advantage of a...Ch. 11 - A _____ defines how users view the organization of...Ch. 11 - A(n) _____ database stores data in tables that...Ch. 11 - A _____ contains data about each file in the...Ch. 11 - Which of the following is not a phase in the SDLC?...Ch. 11 - _____ feasibility measures whether an organization...Ch. 11 - Systems analysts use a(n) _____ test to verify...Ch. 11 - Data type a. procedures that keep data current b....Ch. 11 - Primary key a. procedures that keep data current...Ch. 11 - file maintenance a. procedures that keep data...Ch. 11 - Validation a. procedures that keep data current b....Ch. 11 - check digit a. procedures that keep data current...Ch. 11 - Object a. procedures that keep data current b....Ch. 11 - Standards a. procedures that keep data current b....Ch. 11 - feature creep a. procedures that keep data current...Ch. 11 - object program a. procedures that keep data...Ch. 11 - source program a. procedures that keep data...Ch. 11 - What are common data types?Ch. 11 - What is included in file maintenance?Ch. 11 - What is function creep?Ch. 11 - How does a DBMS typically flag deleted records or...Ch. 11 - What are the different types of validity checks?...Ch. 11 - What are the different types of validity checks?Ch. 11 - What are two major weaknesses of file processing...Ch. 11 - What are the advantages of a database approach to...Ch. 11 - What are three popular data models used today?...Ch. 11 - What trends have contributed to Big Data?Ch. 11 - What is stored in the data dictionary?Ch. 11 - What steps can you take to recover from identity...Ch. 11 - What are the steps in the SDLC?Ch. 11 - Who should be included on a project team? (517)Ch. 11 - How do the responsibilities of a project manager...Ch. 11 - What four tests does a systems analyst use to...Ch. 11 - What techniques do systems analysts use to gather...Ch. 11 - What four major activities take place during the...Ch. 11 - Why is detailed analysis sometimes called logical...Ch. 11 - How do RFQs, RFPs, and RFIs differ? (523)Ch. 11 - What does a program specification package...Ch. 11 - What are the four major steps in the...Ch. 11 - Why might users work with a sandbox? (525)Ch. 11 - What tests might a systems analyst perform on test...Ch. 11 - How do direct, parallel, phased, and pilot...Ch. 11 - How does a compiler differ from an interpreter?...Ch. 11 - What are some popular object-oriented programming...Ch. 11 - No Search Results While searching a web database...Ch. 11 - Incorrect Price You are shopping for groceries...Ch. 11 - Webpage Not Readable You are attempting to view a...Ch. 11 - Inaccurate Credit Report You have obtained a free...Ch. 11 - Webpage Script You are viewing a webpage and have...Ch. 11 - Data Entry Issues You are in charge of adding...Ch. 11 - Incorrect Postal Codes Your companys database...Ch. 11 - Database Connection Error While interacting with a...Ch. 11 - Database Recovery Your boss has informed you that...Ch. 11 - Content Management System Updates You are...Ch. 11 - Technology in Sports You serve as an assistant...Ch. 11 - In addition to the reasons mentioned in this...Ch. 11 - What is a credit score? How can you obtain your...Ch. 11 - If you find erroneous information on your credit...Ch. 11 - What are some reasons why you might want or need...Ch. 11 - What research databases are available through your...Ch. 11 - Evaluate three research databases that you may...Ch. 11 - Have you ever lost or misplaced a device? If so,...Ch. 11 - Evaluate at least three apps that can locate and...Ch. 11 - Some devices offer a feature that allows you to...Ch. 11 - Have you ever created a file in a text editor?...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
Give some examples of database connectivity options and what they are used for.

Database Systems: Design, Implementation, & Management

How would you define artificial intelligence?

Principles of Information Systems (MindTap Course List)

Identify and briefly describe five common fact-finding methods.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

What system is the predecessor of almost all modern multiuser systems?

Principles of Information Security (MindTap Course List)

List three methods of applying cutting fluids.

Precision Machining Technology (MindTap Course List)

Convert 5 megawatts of power into BTU/hr, ft-lbs/s, and kJ/hr.

Fundamentals of Chemical Engineering Thermodynamics (MindTap Course List)

For Problems 16.33 through 16.38, draw the isometric view of the following objects. Make the necessary measurem...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)