Candidate keys that are not used for the primary keys are ________ keys
A) artificial
B) natural
C) alternate
D) composite
C
Computer Science & Information Technology
You might also like to view...
Consider a distributed transaction processing system that uses a serial validation optimistic concurrency control at each site and a two-phase commit protocol. Show that deadlocks are possible under these conditions.
What will be an ideal response?
Computer Science & Information Technology
A dataset is a copy of the fields and records the application can access from a database.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
How does the 64-bit version of Windows support 32-bit applications?
What will be an ideal response?
Computer Science & Information Technology
Which of the following is not part of the three-step auditing process?
A. Enabling auditing for files. B. Turning on and auditing policy. C. Evaluating the system log. D. Reviewing the security log.
Computer Science & Information Technology