A PIN commonly is a set of _____ numbers that can be used in place of passwords.
A. ?three
B. four
C. five
D. ?six
Answer: B
You might also like to view...
Files on disk are identified by a(n) ____________.
a. index b. filename c. access number d. binary signature
____________________ software is designed to run from removable storage.
Fill in the blank(s) with the appropriate word(s).
A table has 100,000 rows and each row occupies 200 bytes. The table is stored on a disk which has 4k bytes per page. Compute the maximum (worst case) cost (number of I/O operations) of doing an equality search on the primary key assuming the following access paths. Make your reasoning clear - a number without an explanation gets no credit.
(a) The data file is unsorted and has no index. (b) The data file is sorted on the primary key and has no index. (c) There is an unclustered static hash index whose search key is the primary key. Assume all buckets are stored on disk and that each bucket has one overflow page. (d) There is an unclustered B+ tree index whose search key is the primary key. Assume that each entry in the tree occupies 20 bytes and the entire tree resides on the disk.
Match the following terms to their meanings:
I. range II. Copy as Picture command III. nonadjacent range IV. Copy V. select all cells in a worksheet A. C10:C20 and E10:E20 B. default copy option C. cannot edit individual cell data D. press Ctrl+A twice E. group of adjacent or contiguous cells