You can use a database ________ to ask a question of the data

A) report B) form C) query D) table


C

Computer Science & Information Technology

You might also like to view...

Arrays static method ________ fills an array with values produced by a generator function that receives an int and returns a value of type int, long or double.

a. parallelFill b. parallelFillAll c. generateAll d. parallelSetAll

Computer Science & Information Technology

Consider the following schema, where the keys are underlined:



The SSN attribute in Project is the Id of the employee working on the project and PID is the
Id of the project. There can be several employees per project, but the functional dependency
PID ! Name,Budget holds (so the relation is not normalized). Consider the query.


SELECT P.Budget, P.Name, E.Name
FROM Employee E, Project P
WHERE E.SSN = P.SSN AND
P.Budget > 99 AND
E.Name = 'John'
ORDER BY P.Budget


Assume the following statistical information:
 10,000 tuples in Employee relation
 20,000 tuples in Project relation
 40 tuples/page in each relation
 10-page bu er
 1,000 di erent values for E.Name
 The domain of Budget consists of integers in the range of 1 to 100
 Indices:
? Employee relation:
On Name: Unclustered, hash
? Project relation:
On SSN: Unclustered, hash
On Budget: Clustered, 2-level B+ tree
Question: Find the best execution plan, draw it, and estimate its cost.

Computer Science & Information Technology

____ includes special visual and sound effects applied to text or other content.

A. Animation B. Audio control C. Playback control D. Visual effects

Computer Science & Information Technology

If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?

A. userB's private key B. userB's public key C. userA's public key D. userA's private key

Computer Science & Information Technology