Which of the following is thebestway to migrate a large data load from one table to another, considering total time and blocking?
Which of the following constraints is used to enforce referential integrity?
A database administrator would like to create a table named XYZ. Which of the following queries should the database administrator use to create the table?
A)
B)
C)
D)
Following a security breach, a database administrator needs to ensure users cannot change data unless a request is approved by the management team. Which of the following principles addresses this issue?