The ___________________ is the number of possible values of the digits or characters in a sort key.

a) radix
b) asymptote
c) thread
d) order
e) none of the above


a) radix

Computer Science & Information Technology

You might also like to view...

MySQL is an example of a(n):

a. LAMP b. DBA c. API d. RDBMS

Computer Science & Information Technology

When capturing live memory from a computer system what is meant by the term footprint?

a. The amount of free space on the targe medium required for the copy being made. b. The amount of memory on the target system required by the software tools being used to capture memory. c. Memory content variable caused by the fact RAM is constantly changing while the system memory is being imaged. d. The I/O port required by the device acquiring the memory.

Computer Science & Information Technology

The table below lists customer/car hire data. Each customer may hire cars from various outlets throughout Glasgow. A car is registered at a particular outlet and can be hired out to a customer on a given date.

![15237|637x171](upload://jTQvphC8e5yNPalkIuWgHxdNOhl.png) (a) The data in the table is susceptible to update anomalies. Provide examples of how insertion, deletion, and modification anomalies could occur on this table. (b) Identify the functional dependencies represented by the data shown in the table. State any assumptions you make about the data. (c) Using the functional dependencies identified in part (b), describe and illustrate the process of normalization by converting Table 1 to Third Normal Form (3NF) relations. Identify the primary and foreign keys in your 3NF relations.

Computer Science & Information Technology

Which of the following can be used to defend against SYN flood attacks?

a. Micro blocks b. SYN cookies c. Stateful packet inspection firewalls d. All the above

Computer Science & Information Technology