Which mechanism provides database users with controlled access to the database through the use of virtual tables?
Answer : A
Which subset of Structured Query Language (SQL) is used to create and name database entities?
Answer : C
Which subset of Structured Query Language (SQL) is used to limit access to a database or its data?
Answer : B
Which of the following ACID properties requires that a transaction be executed in its entirety or not all?
Answer : D
Consider the entity-relation (ER) diagram shown in the exhibit. When the logical database design phase is completed, which of the following is a valid DBDL description of the base relations for the ER diagram?
Answer : D
Which pair of relational algebraic operations requires union compatibility?
Answer : C
Your enterprise is developing a database system that will contain highly sensitive data.
Security of the data will take priority over database processing speed. Which database protection technique should be employed?
Answer : C
In which situation would the DBMS use a serial schedule to execute the transactions?
Answer : C
A theta-join can be viewed as:
Answer : C
Which of the following best describes the ON DELETE CASCADE referential integrity constraint?
Answer : A
Which of the following definitions best describes an entity?
Answer : D
What is the highest normal form of the relation(s) shown in the exhibit?
Answer : D
Which term describes the management of simultaneous transactions to prevent conflicts?
Answer : D
Consider the relation shown in the exhibit. Which of the following SQL statements would properly add information for a new employee?
Answer : D