Introduction to Database System Data security threats include fraudulent manipulation of data all of the listed here privacy invasion hardware failure fraudulent manipulation of data all of the listed here privacy invasion hardware failure ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System SQL stands for ________ . Sequential Query Language Structured Query Language Sequential Question Language Structured Question Language Sequential Query Language Structured Query Language Sequential Question Language Structured Question Language ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The primary key is selected from the: candidate keys. determinants. composite keys. foreign keys. candidate keys. determinants. composite keys. foreign keys. ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which two files are used during operation of the DBMS? data dictionary and transaction log data dictionary and query language query language and utilities None of the listed here data dictionary and transaction log data dictionary and query language query language and utilities None of the listed here ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System In a relation, the rows are sometimes called "fields". True False True False ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A relation is in Boyce-Codd Normal Form (BCNF) if every determinant is a composite key. False True False True ANSWER DOWNLOAD EXAMIANS APP