Discuss how data integrity can be controlled
What will be an ideal response?
In many database management systems, data integrity controls can be built into the field. The data type is one integrity control. Another integrity control is default values, where one specifies the value that the field will take if no data has been entered. Range control is another data integrity constraint which indicates the upper and lower bounds for the field. Null value control allows one to specify whether null values are allowed or not in the field. Finally, referential integrity ensures that any value entered into a foreign key must have a corresponding value in the primary key of the related table. This ensures that there are no misplaced values in the foreign key.
You might also like to view...
What are the various functions performed by members of a marketing channel? Provide examples
What will be an ideal response?
The following information relates to the defined benefit pension plan of the Steamer Company for the year ending December 31 . 2014: Projected benefit obligation, January 1 .............. $4,600,000 Projected benefit obligation, December 31 ............ 4,729,000 Fair value of plan assets, January 1 ................. 5,035,000 Fair value of plan assets, December 31 ............... 5,565,000
Expected return on plan assets ....................... 450,000 Amortization of deferred gain ........................ 32,500 Employer contributions ............................... 425,000 Benefits paid to retirees ............................ 390,000 Settlement rate ...................................... 10% The net periodic pension cost reported in the income statement for 2014 would be a. $11,500. b. $24,000. c. $36,500. d. $59,000.
The minimal spanning tree allows the visitation of each node without backtracking
Indicate whether this statement is true or false.
Part of Eric's job is __________, which requires him to perform systematic, regular monitoring of major external forces that influence the organization.
A. demand forecasting B. environmental scanning C. exception reporting D. influence analysis