Rows in a table often are called records or ____.

A. attributes
B. lines
C. relations
D. tuples


Answer: D

Computer Science & Information Technology

You might also like to view...

In a(n) ____________________ attack, the attacker eavesdrops on the victim's session and uses statistical analysis of patterns and inter-keystroke timings to discern sensitive session information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A customer is looking to replace three aging network servers that are not able to keep up with the growing demand of the company’s users. The customer would also like to add three additional servers to provide on-site DNS, intranet, and file services. A technician is recommending a bare metal hypervisor as the best solution for this customer.   Which of the following describes the recommended solution?

A. Type 2 hypervisor installed on a Windows or Linux host OS. B. Type 2 hypervisor installed directly on server hardware. C. Type 1 hypervisor installed directly on server hardware. D. Hosted hypervisor installed as an application.

Computer Science & Information Technology

How would you identify entity and relationship types from a user’s requirements specification?

What will be an ideal response?

Computer Science & Information Technology

Which of the following statements about a dual-homed host firewall is true?

A) The automatic routing function has to be enabled so that the firewall can work. B) Systems inside and outside the firewall cannot communicate with each other directly. C) A dual-homed firewall runs on a server with one network interface. D) IP packets from the Internet are routed directly to the internal network.

Computer Science & Information Technology