Question: Is database useful for cybersecurity matters? True False A good ____ should provide an opportunity for users to incorporate integrity constrain when they design the

  1. Is database useful for cybersecurity matters?
    1. True
    2. False

  1. A good ____ should provide an opportunity for users to incorporate integrity constrain when they design the database:
    1. Database administrator
    2. DBA
    3. E-A relationship
    4. DBMS

  1. An entity is also define as an attribute:
    1. True
    2. False

  1. If B is functionally on A, you can also say that B functionally determine A:
    1. True
    2. False

  1. In Oracle SQL, the____ is used as a wildcard to represent any individual character:
    1. Asterisk ( * )
    2. Percent sign ( % )
    3. Underscore ( _ )
    4. Question mark ( ? )

  1. A valid name for a table might be tbl$Student:
    1. True
    2. False

  1. You can use the SQL CREATE TABLE command to insert row into a table:
    1. True
    2. False

  1. A visual way to represent a database is with a(n)___:
    1. spreadsheetDMS
    2. DBMS
    3. E-R relationship
    4. DBA

  1. An attribute is a characteristic or property of an entity:
    1. True
    2. False

  1. An individual can view to create reports, chart, and other object that show database data:
    1. True
    2. False

  1. Popular ____ include Access =, Oracle, DB2, MySQL and SQL server:
    1. E-R relationship
    2. DBA
    3. Data file
    4. DBM

  1. Views cannot be used to examine table data:
    1. True
    2. False

  1. SQL use command to create table, update tables and retrieve data from tables:
    1. True
    2. False

  1. A person who is charge of a database withing an organization is often call the database ____:
    1. Writer
    2. Designer
    3. Administrator
    4. Constroller

  1. A views is physical table in the DBMS:
    1. True
    2. False

  1. A table that is in first normal form is better than one that is in second normal form:
    1. True
    2. false

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!