Introduction to Database System Data encryption techniques are particularly useful for reducing storage space requirements improving data integrity protecting data in data communication systems All of these None of these reducing storage space requirements improving data integrity protecting data in data communication systems All of these None of these ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A command that lets you change one or more fields in a record is All of these None of these Insert Modify Look-up All of these None of these Insert Modify Look-up ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n): transitive dependency. insertion anomaly. referential integrity constraint. normal form. transitive dependency. insertion anomaly. referential integrity constraint. normal form. ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System One of the reasons why OODBMSs have not been widely used for business information systems is that OOP is obsolete. True False True False ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A database management system might consist of application programs and a software package called AUTOFLOW TOTAL BPL FORTRAN AUTOFLOW TOTAL BPL FORTRAN ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following refers to an entity in which the identifier of one entity includes the identifier of another entity? Strong entity ID-dependent entity Weak entity ID-independent entity Strong entity ID-dependent entity Weak entity ID-independent entity ANSWER DOWNLOAD EXAMIANS APP