11. Which ONE of the following threats does not cause loss of integrity? ( ) Program alteration. ( ) Wire tapping. ( ) Electronic interference and radiation. ( ) Data corruption due to power loss or surge. 12. What type of functional dependency is present in the following dependencies?  staffNo -> sName, position, salary, branchNo, bAddress branchNo -> bAddress ( ) Partial functional dependency ( ) Transitive dependency ( ) Determinant dependency ( ) Partial transitive dependency 13.Consider the following set of functional dependencies on a relation R(A, B, C).

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

11. Which ONE of the following threats does not cause loss of integrity?
( ) Program alteration.
( ) Wire tapping.
( ) Electronic interference and radiation.
( ) Data corruption due to power loss or surge.

12. What type of functional dependency is present in the following dependencies? 
staffNo -> sName, position, salary, branchNo, bAddress
branchNo -> bAddress

( ) Partial functional dependency
( ) Transitive dependency
( ) Determinant dependency
( ) Partial transitive dependency

13.Consider the following set of functional dependencies on a relation R(A, B, C). 
A->BC
B->C
A->B
AB->C

14. The minimal set of functional dependencies is
( ) A->BC and B->C
( ) A->BC and AB->C
( ) A->BC and A->B
( ) A->B and B->C

15. Why can unary operations and set operations nest with each other?
( ) because a set operation of relational algebra can be viewed as nested unary operations.
( ) because output from one operation is a relation, which can become input to another operation.
( ) because the output from nested set operations must be input into a unary operation.
( ) because output of set operations is always equal to the output of nested unary operations.

Expert Solution
steps

Step by step

Solved in 3 steps

Blurred answer
Knowledge Booster
Concurrency control
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education