Introduction to Database System Data encryption techniques are particularly useful for All of these reducing storage space requirements None of these improving data integrity protecting data in data communication systems All of these reducing storage space requirements None of these improving data integrity protecting data in data communication systems ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System For some relations, changing the data can have undesirable consequences called: modification anomalies. normal forms. transitive dependencies. referential integrity constraints. modification anomalies. normal forms. transitive dependencies. referential integrity constraints. ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time? None of these query language transaction log data manipulation language report writer None of these query language transaction log data manipulation language report writer ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following is not a relational database? 4th Dimension dBASE IV Reflex FoxPro 4th Dimension dBASE IV Reflex FoxPro ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System In order to use a record management system None of these Both (a) and (b) You need to understand the model the record management system uses. All of these You need to understand the low-level details of how information in stored None of these Both (a) and (b) You need to understand the model the record management system uses. All of these You need to understand the low-level details of how information in stored ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Prior to 1970, all data was stored in separate files, which were mostly stored on reels of magnetic tape. False True False True ANSWER DOWNLOAD EXAMIANS APP