Columns in a table often are called fields or ____.
A. attributes
B. lines
C. relations
D. tuples
Answer: A
You might also like to view...
Which of the following are the two basic modes in which IPsec can operate?
A. Encrypted and encapsulated B. Open and secure C. Transport and tunnel D. Authenticated and clear text
We said that any computer program can be constructed using a single instruction that performs a subtraction and branches on negative. Discuss the accuracy of this statement.
What will be an ideal response?
What is the difference between information and data?
What will be an ideal response?
The data definition language
A. identifies, for the database management system, the names and relationships of all data elements, records, and files that comprise the database B. inserts database commands into application programs to enable standard programs to interact with and manipulate the database C. permits users to process data in the database without the need for conventional programs D. describes every data element in the database