Match the following terms with their descriptions:I.Access Database ExecutableII.Transitive dependencyIII.AnomalyIV.Non-key fieldV.EncryptionA.When the value of one non-key field is functionally dependent on the value of another non-key fieldB.Any field which is not a part of the primary keyC.An error or inconsistency of dataD.Limits what users can do in a databaseE.Makes a database unreadable to anyone who does not have the key

Fill in the blank(s) with the appropriate word(s).


D, A, C, B, E

Computer Science & Information Technology

You might also like to view...

MC XSL transformations involve two tree structures—the__________ tree and the__________ tree.

a) source, result. b) SAX, DOM. c) top, bottom. d) None of the above.

Computer Science & Information Technology

In order to protect your intellectual property in other countries, you must file an international copyright

Indicate whether the statement is true or false

Computer Science & Information Technology

You create styles in the Modify Styles dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a Web 2.0 service or application?

A) wikis. B) e-mail. C) IM. D) online forums.

Computer Science & Information Technology