1.unlock the database
2.provide a map of the data
3.uniquely identify a record
4.establish constraints on database operations.
Answer:2