Which database architecture is best suited to implementation in the World Wide Web environment?
Which database architecture is best suited to implementation in the World Wide Web environment?
Which mechanism provides database users with controlled access to the database through the use of virtual tabl
Which mechanism provides database users with controlled access to the database through the use of virtual tables?
Which concurrency control method should be used only when conflicts between transactions rarely occur?
Which concurrency control method should be used only when conflicts between transactions rarely occur?
Which type of dependency occurs when one attribute of a composite key is removed and the dependency still exis
Which type of dependency occurs when one attribute of a composite key is removed and the dependency still exists?
Which of the following SQL statements properly removes any alteration privileges from Group_2?
Your database administrator has disallowed a group of users from making alterations to the Employees table in your corporate database. The users, known as Group_2, previously had full privileges with the Employees table. Which of the following SQL statements properly removes any alteration privileges from Group_2?
Which area of database security involves maintaining access to enterprise data?
Which area of database security involves maintaining access to enterprise data?
Which statement best describes a procedural data manipulation language command?
Which statement best describes a procedural data manipulation language command?
What is a data dictionary?
What is a data dictionary?
Which type of relational integrity is violated if a primary key in a database has a null value?
Which type of relational integrity is violated if a primary key in a database has a null value?
Which subset of Structured Query Language (SQL) is used to limit access to a database or its data?
Which subset of Structured Query Language (SQL) is used to limit access to a database or its data?