Introduction to Database System Which command(s) is(are) used to enable/disable/drop an integrity constraint in SQL? MODIFY TABLE All of the listed here DEFINE TABLE ALTER TABLE MODIFY TABLE All of the listed here DEFINE TABLE ALTER TABLE ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Each of data files has a _____ that describe the way the data is stored in the file. Fields Database File structure Records Fields Database File structure Records ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The model for a _____ resembles the hierarchical model in many respects. Network database None of these Distributed database Relational database Hierarchical database Network database None of these Distributed database Relational database Hierarchical database ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The term _____ is sometimes used to refer to a data file in which all the records have the same record format, that is, the same field names, field lengths, and data types. Database Flat file Data structure Table None of these Database Flat file Data structure Table None of these ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System If a piece of data is stored in two places in the database, then None of these storage space is wasted it can be more easily accessed both (a) and (b) changing the data is one spot will cause data inconsistency None of these storage space is wasted it can be more easily accessed both (a) and (b) changing the data is one spot will cause data inconsistency ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Data security threats include hardware failure fraudulent manipulation of data privacy invasion all of the listed here hardware failure fraudulent manipulation of data privacy invasion all of the listed here ANSWER DOWNLOAD EXAMIANS APP