In order to create a unique field in a table in a database

Assignment Help Basic Computer Science
Reference no: EM13463598

1. In order to create a unique field in a table in a database, you need to define a _________.

  • view
  • primary key
  • host key
  • join

2.A _________ in a database can combine two or more tables together.

  • trigger
  • view
  • primary key
  • host key

3.To create an SQLDataSource from the Designer, developers can _______.

  • drag and drop it from the Server Explorer
  • drag and drop it from the Toolbox
  • drag and drop it from inside the Properties
  • start the SQLServer Wizard
  • start the DataConnection Wizard

4. _______ allows you to format the data in a certain way.

  • Query Builder Wizard
  • Server Explorer
  • Dataset
  • Color selector

5. The _________ control displays all data in a spreadsheet format.

  • Data Adapter
  • DataConnection
  • Textbox
  • Tree View
  • GridView

6. ________ is the ability for the GridView to display data one page at a time.

  • Referencing
  • Block recording
  • Paging
  • Locking
  • Data binding

7.The __________ control displays a single row of data.

  • DetailsView
  • Textbox
  • Tree View
  • Spreadsheet
  • GridView

8.The _________ layer is used to contain the database.

  • Middle/Business
  • Presentation
  • Solution
  • Server
  • Database

9.The ________ layer is used to maintain the display.

  • Data
  • Presentation
  • Solution
  • Server

10.The three objects you need in .Net to display data are _______.

  • connection, query, dataset
  • connection, query, data field
  • server, client, application
  • IIS, Web form, server
  • connection, adapter, dataset

Reference no: EM13463598

Questions Cloud

Define and explain the differences between vision and : define and explain the differences between vision and mission
Though you require more information to begin treatment what : 1. what other information would you like to learn during the interview with the family? what questions would you ask?2.
Evaluate the major components of effective mission : assess the major components of an effective mission statement. which do you find to be the most important? explain
Imagine you are an entrepreneur starting a new business : e-business please respond to the following nbspnbspassess the challenges e-business and e-commerce technologies
In order to create a unique field in a table in a database : 1. in order to create a unique field in a table in a database you need to define a .viewprimary keyhost keyjoin2.a in
Discuss the relationship between strategic management and : question 1 explain the relationship between strategic management and competitive advantage for
What was the acceptable use policy in place on the internet : answer the following questions from a. what was the acceptable use policy in place on the internet before 1995? b. why
Suppose you had job offers from two companies which varied : 1. management consulting firms did very well on a per-employee basis partly because they are mostly comprised as
Using only the materials provided in course explain three : using only the materials provided in the course discuss three factors that a court will use in determining whether to

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Display the total and average number of calories burned

How would you solve the following in C++? Please write code below: Write a condition-controlled while loop that allows the user to enter the calories they burned. Stop looping when the user enters a negative number. Display the Total and Average n..

  Write down sructured english for clyde-s narrative

On a trip lasting more than one day, we permit hotel, taxi, and airfare also meal allowances. Same times apply for meal expenses. Write down sructured English for Clyde's narrative of the reimbursement policies.

  A disadvantage of the content of approach for lans

A disadvantage of the content of approach for LANs, such as CSMA/CD, is the capacity wasted due to multiple stations attempting to access the channel at the same time. Suppose that time is divided into discrete slots, with each of N stations attempti..

  What is probability that one of students will beliving

What is the probability that one of the students will beliving on campus given that he orshe is from out of state?

  Signed-magnitude representations binary numbers in computers

Why do we require signed-and-magnitude representations of binary numbers in computers? Represent decimal values: -37, -54, and 56 in binary by using signed-and magnitude representation.

  Alter computation of prefix function-correctly match string

if ‘_' is wild-card, then pattern ‘foo*bar*nad' can be found in ‘foofoowangbarnad'. Alter computation of prefix function to correctly match strings using KMP.

  Describe the model''s strengths and weaknesses

Describe the model's strengths and weaknesses

  Code skeleton to declare a class named date

Complete the following code skeleton to declare a class named Date. The class should contain variables and functions to store and retrieve a data in the form 4/2/2012.

  What is the output of this code sequence

What is the output of this code sequence?

  Explaining threat category

An individual threat can be represented in more than one threat category. If a hacker hacks into a network, copies a few files.

  What is the goal of computer forensics

What is the goal of computer forensics? How do investigators retrieve and analyze data?How is the information used in investigations?

  Both the discussion and in the assignment tool

Post your response to the following questions in both the discussion and in the assignment tool. Name your assignment in the following manner: LastName_4A

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd