Which of the following is true about naming objects?
A. the database management system provides strict rules
B. Camel case does not use special characters to link words
C. tables should always be named with a character prefix
D. A column name of Last Name is preferable to LastName
Answer: B
You might also like to view...
Which of the following best defines what intrusion detection is? (Select all that apply.)
a. The monitoring of data packets passing through the network to catch potential attacks. b. The monitoring of data packets passing through the network to catch ongoing attacks. c. The monitoring of data packets with invalid IP addresses that pass through the network. d. None of these answers is correct.
List all borrower details.
What will be an ideal response?
The OSI ____ layer defines all electrical and physical specifications for devices.
A. network B. application C. data link D. physical
Deploying compensating security controls is an example of:
A. Risk avoidance B. Risk mitigation C. Risk transference D. Risk acceptance