Introduction to Database System An audit trail All of the listed here can be used to restore lost information is used to make back-up copies is the recorded history of operations performed on a file All of the listed here can be used to restore lost information is used to make back-up copies is the recorded history of operations performed on a file ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Data encryption techniques are particularly useful for protecting data in data communication systems reducing storage space requirements All of these None of these improving data integrity protecting data in data communication systems reducing storage space requirements All of these None of these improving data integrity ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The index consists of a list of keys All of these pointers to the master list both (a) and (b) None of these a list of keys All of these pointers to the master list both (a) and (b) None of these ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The functional dependency R → S means that the value of S can be determined when we are given a value of R. True False True False ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which two files are used during operation of the DBMS? data dictionary and transaction log query language and utilities None of the listed here data dictionary and query language data dictionary and transaction log query language and utilities None of the listed here data dictionary and query language ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following products was an early implementation of the relational model developed by E.F. Codd of IBM? IDMS R:base DB2 dBase-II IDMS R:base DB2 dBase-II ANSWER DOWNLOAD EXAMIANS APP