Your enterprise is developing a database system that will contain highly sensitive data.
Security of the data will take priority over database processing speed. Which database protection
technique should be employed?
Answer : C
Which mechanism provides database users with controlled access to the database through the
use of virtual tables?
Answer : A
Consider the following relational algebraic expression:
Which of the following SQL statements is equivalent to this relational algebraic expression?
Answer : C
Consider the Information Engineering diagram in the exhibit showing the relations
BUILDING and RESIDENT. What is the relationship between BUILDING and RESIDENT?
Answer : B
Consider the following table as well as the Dept1_Parts and Dept2_Parts relations shown in
the exhibit:
Which of the following relational algebraic expressions would result in the given table?
Answer : A
The exhibit shows a table called Activity Relation that relates a unique student identification
number with a sports activity and a fee for participating in that activity. A student can participate
in only one activity. The key for the relation is Student_ID. What consequence would occur if the
tuple for Student_ID 1001 were removed?
Answer : C
Consider the table for an employee database shown in the exhibit. What is the cardinality of
the table?
Answer : C