Introduction to Database System To have a file hold a list, it is necessary to identify the name, width and type of the fields of each record. identify the records in the list decide which fields will be used as sort or index keys All of the listed here identify the name, width and type of the fields of each record. identify the records in the list decide which fields will be used as sort or index keys All of the listed here ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A list consists of last names, first names, addresses, and pin codes if all people in the list have the same last and the same pin code, a useful key would be the pin code None of these the last name All of these a compound key consisting of the first name and the last name the pin code None of these the last name All of these a compound key consisting of the first name and the last name ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System One solution to the multivalued dependency constraint problem is to: add a composite key. create a new theme. change the theme. split the relation into two relations, each with a single theme. add a composite key. create a new theme. change the theme. split the relation into two relations, each with a single theme. ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Related fields in a data base are grouped to form menu None of these data record data file bank menu None of these data record data file bank ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System A relational database management (RDBM) package manages data in more than one file at once. How does it organize these file? As tuple both (a) and (b) relations tables None of these tuple both (a) and (b) relations tables None of these ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Data encryption techniques are particularly useful for All of these None of these reducing storage space requirements improving data integrity protecting data in data communication systems All of these None of these reducing storage space requirements improving data integrity protecting data in data communication systems ANSWER DOWNLOAD EXAMIANS APP