a. Foreign keys
i. Domain constraint
b. Private key ii. Referential integrity
c. Event control action model iii. Encryption
d. Data security iv. Trigger
Codes :
a b c d
(A) iii ii i iv
(B) ii i iv iii
(C) iii iv i ii
(D) i ii iii iv
Answer B.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.