Which of the following is true about naming objects?

A. the database management system provides strict rules
B. Camel case does not use special characters to link words
C. tables should always be named with a character prefix
D. A column name of Last Name is preferable to LastName


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following best defines what intrusion detection is? (Select all that apply.)

a. The monitoring of data packets passing through the network to catch potential attacks. b. The monitoring of data packets passing through the network to catch ongoing attacks. c. The monitoring of data packets with invalid IP addresses that pass through the network. d. None of these answers is correct.

Computer Science & Information Technology

List all borrower details.

What will be an ideal response?

Computer Science & Information Technology

The OSI ____ layer defines all electrical and physical specifications for devices.

A. network B. application C. data link D. physical

Computer Science & Information Technology

Deploying compensating security controls is an example of:

A. Risk avoidance B. Risk mitigation C. Risk transference D. Risk acceptance

Computer Science & Information Technology