Introduction to Database System Data encryption techniques are particularly useful for All of these None of these protecting data in data communication systems improving data integrity reducing storage space requirements All of these None of these protecting data in data communication systems improving data integrity reducing storage space requirements ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The on-line, softcopy display a customer's charge account to respond to an inquiry is an examples of a on demand report exception report regularly scheduled report forecasting report on demand report exception report regularly scheduled report forecasting report ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A key: identifies a row. identifies a column. can only be one column. must always be composed of two or more columns. identifies a row. identifies a column. can only be one column. must always be composed of two or more columns. ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL? DEFINE TABLE MODIFY TABLE ALTER TABLE All of the listed here DEFINE TABLE MODIFY TABLE ALTER TABLE All of the listed here ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System An attribute describes the entity's characteristics. True False True False ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following is a serious problem of file management systems? data redundancy program dependence difficult to update lack of data independence All of these data redundancy program dependence difficult to update lack of data independence All of these ANSWER DOWNLOAD EXAMIANS APP