Introduction to Database System Data security threats include hardware failure privacy invasion fraudulent manipulation of data all of the listed here hardware failure privacy invasion fraudulent manipulation of data all of the listed here ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A large computer information system maintains many different computer files. Which amongst them is called a perpetual file? Master file Update file Specialized file Log file Master file Update file Specialized file Log file ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following products implemented the CODASYL DBTG model? dBase-II DB2 IDMS R:base dBase-II DB2 IDMS R:base ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following is not an advantage of the data-base approach? ability to associate related data increased security program/data independence All of these elimination of the data redundancy ability to associate related data increased security program/data independence All of these elimination of the data redundancy ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A command that lets you change one or more fields in a record is None of these Modify Insert All of these Look-up None of these Modify Insert All of these Look-up ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Relationship classes are associations between entity classes. False True False True ANSWER DOWNLOAD EXAMIANS APP