Match the following terms with their descriptions:I.Access Database ExecutableII.Transitive dependencyIII.AnomalyIV.Non-key fieldV.EncryptionA.When the value of one non-key field is functionally dependent on the value of another non-key fieldB.Any field which is not a part of the primary keyC.An error or inconsistency of dataD.Limits what users can do in a databaseE.Makes a database unreadable to anyone who does not have the key
Fill in the blank(s) with the appropriate word(s).
D, A, C, B, E
Computer Science & Information Technology
You might also like to view...
MC XSL transformations involve two tree structures—the__________ tree and the__________ tree.
a) source, result. b) SAX, DOM. c) top, bottom. d) None of the above.
Computer Science & Information Technology
In order to protect your intellectual property in other countries, you must file an international copyright
Indicate whether the statement is true or false
Computer Science & Information Technology
You create styles in the Modify Styles dialog box.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is a Web 2.0 service or application?
A) wikis. B) e-mail. C) IM. D) online forums.
Computer Science & Information Technology