8. Data Manipulation Language enables users to: a. Retrieve information stored in database b. Insert new information into the database c. Delete information from the database d. All of the above
8. Data Manipulation Language enables users to: a. Retrieve information stored in database b. Insert new information into the database c. Delete information from the database d. All of the above
Database Systems: Design, Implementation, & Management
12th Edition
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Carlos Coronel, Steven Morris
Chapter2: Data Models
Section: Chapter Questions
Problem 10P
Related questions
Question
Topic: Fundamentals of Database Systems
Choose the letter of the correct answer. Answer only no explanation. Thank you.
8. Data Manipulation Language enables users to:
a. Retrieve information stored in database
b. Insert new information into the database
c. Delete information from the database
d. All of the above
9. When you normalize a relation by breaking it into two smaller relations, what must you do to maintain data integrity?
a. Link the relations by a common field
b. Remove any functional dependencies from both relations
c. Assign both relations the same primary key field(s)
d. Create a primary key(s) and foreign key(s) for all new relation
10. Which particular normal form is considered as adequate for usual database design?
a. 1NF
b. 2NF
c. 3NF
d. 4NF
11. Which normal form is based on removal of list values in records but still contains duplicate values?
a. 1NF
b. 2NF
c. 3NF
d. 4NF
12. What does the Data Manipulation Language do in database records?
a. It defines indexes and imposes constraints between database tables
b. It is a syntax used for executing queries
c. It is used for creating reports
d. It is used for creating the graphical user interface
13. Which term refers to the application programs in the workstations?
a. front-end programs
b. back end programs
c. server programs
d. client programs
14. A function that has no partial dependencies is in ___ form
a. 1NF
b. 2NF
c. 3NF
d. Fully Normalized
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781305627482
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781285196145
Author:
Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781305627482
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781285196145
Author:
Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning