A(n) ____ dependency occurs between two nonkey fields that are both dependent on a third field.

A. transitive
B. dependent
C. indexed
D. absolute


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the difference between the gdb commands step and next? Give an example to explain your answer.

What will be an ideal response?

Computer Science & Information Technology

When comments are visible, by default they display:

A) in the left margin. B) in the bottom margin. C) in the markup area. D) within the body text of the document.

Computer Science & Information Technology

____ software combines word processing with advanced graphics capabilities.?

A. ?Speech recognition B. ?Web development C. ?Desktop publishing D. ?Presentation

Computer Science & Information Technology

Passwords are secret codes that users enter to gain access to systems. Security can be compromised by all of the following except

A. failure to change passwords on a regular basis B. using obscure passwords unknown to others C. recording passwords in obvious places D. selecting passwords that can be easily detected by computer criminals

Computer Science & Information Technology