Which of the following best describes a composite key?
Which of the following best describes a composite key?
Which database protection technique should be employed?
Your enterprise is developing a database system that will contain highly sensitive data. Security of the data will take priority over database processing speed. Which database protection technique should be employed?
which types of relationships?
The creation of intermediate entities occurs during the logical database design phase for an enterprise. It is used to resolve which types of relationships?
Which of the following occurs in a relation when records are added or removed?
Which of the following occurs in a relation when records are added or removed?
Which of the following lists four advantages of using a DBMS?
You enterprise must decide whether to use a database management system. Which of the following lists four advantages of using a DBMS?
What improvement can be made to file-based databases to overcome their limitations?
What improvement can be made to file-based databases to overcome their limitations?
What is a relational database domain?
What is a relational database domain?
What is the most important service provided by a database management system?
What is the most important service provided by a database management system?
Which pair of relational algebraic operations requires union compatibility?
Which pair of relational algebraic operations requires union compatibility?
What is a domain?
What is a domain?