Introduction to Database System Data encryption techniques are particularly useful for All of these protecting data in data communication systems reducing storage space requirements improving data integrity None of these All of these protecting data in data communication systems reducing storage space requirements improving data integrity None of these ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System An audit trail can be used to restore lost information is used to make back-up copies is the recorded history of operations performed on a file All of the listed here can be used to restore lost information is used to make back-up copies is the recorded history of operations performed on a file All of the listed here ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System In a large DBMS each user can access every sub¬schema each subschema contains every field in the logical schema each user can "see" only a small part of the entire database all of the listed here each user can access every sub¬schema each subschema contains every field in the logical schema each user can "see" only a small part of the entire database all of the listed here ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The modify operation is likely to be done after Delete Look-up Insert All of these None of these Delete Look-up Insert All of these None of these ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Properties that describe the characteristics of entities are called: relationships. attributes. identifiers. entities. relationships. attributes. identifiers. entities. ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The DBMS that is most difficult to use is ________ . Oracle Corporation's Oracle Microsoft's Access IBM's DB2 Microsoft's SQL Server Oracle Corporation's Oracle Microsoft's Access IBM's DB2 Microsoft's SQL Server ANSWER DOWNLOAD EXAMIANS APP