1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
butalik [34]
3 years ago
8

What do you call an index if the index record contains the search-key value and a pointer to the first data record with that sea

rch-key value?
Select one:

a. A loose primary index

b. A dense primary index

c. A compact primary index

d. A sparse primary index

e. A crowded primary index
Computers and Technology
1 answer:
JulijaS [17]3 years ago
6 0

Answer: b)A dense primary index

Explanation: Dense primary key is defined as all the search key belonging to the database has a corresponding index record. The record searching becomes easier and quick with this technique .The drawback of this index is requires large space for storage of records. Index persist of the key value and pointer for the record.

Other options are incorrect because loose index works for only some fraction of keys and compact primary index contains the record in compact column manner. Sparse primary index contains record of indexed area and crowded index is over the crowd ratio index .Thus, the correct option is option(b).

You might be interested in
Which of the following best describes a situation where software should be upgraded instead of replaced?
ad-work [718]

an OS systems security is at a high risk to hackers so the company can update the OS to improve security

7 0
3 years ago
"when a dynamic web page is requested, the web server passes the request to"
nalin [4]
System operations of the website u are  asking to access
7 0
4 years ago
______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
Kitty [74]

Answer:

"IP security" is the correct answer for the above question.

Explanation:

  • "IP security" is a set of rules or protocols which are used for the communication of the network.
  • It is a protocol that is used to encrypt the data which is needed to transfer on the network.
  • It provides security for the communication and it encrypts the data which is needs o transfer on the network.
  • The above question asked about the term which is used for encryption and security. So the answer is "IP security", which is defined above.
7 0
4 years ago
Read 2 more answers
How can we get the number of records or rows in a table using MySQL? *
luda_lava [24]

The number of records or rows in a table using MySQL can be got by using the COUNT statement.

Explanation:

  • To counts all of the rows in a table, whether they contain NULL values or not, use COUNT
  • That form of the COUNT() function basically returns the number of rows in a result set returned by a SELECT statement
  • The SQL COUNT() function returns the number of rows in a table satisfying the criteria specified in the WHERE clause.
  • It sets the number of rows or non NULL column values.
  • COUNT() returns 0 if there were no matching rows.
  • The SQL COUNT function is an aggregate function that returns the number of rows returned by a query. You can use the COUNT function in the SELECT statement to get the number of employees, the number of employees in each department, the number of employees who hold a specific job, etc.
3 0
3 years ago
A good place to get hints about how to answer a response question could be a. Your teacher c. Both of these b. The rest of the t
Julli [10]

i'm assuming the answer would be c- both of these

5 0
4 years ago
Read 2 more answers
Other questions:
  • Its false because I got it wrong
    5·1 answer
  • Atms typically use single factor authentication. <br> a. True <br> b. False flashcard
    5·1 answer
  • . File systems do not maintain the attributes associated with the files. Select one: True False
    13·1 answer
  • On what basis can you categorize the generations of computers?
    11·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • The user does not need to highlight data within an Excel worksheet in order to remove conditional formatting. True or false
    14·1 answer
  • To connect several computers together, one generally needs to be running a(n) ____ operating system
    6·1 answer
  • And this help me please as well. ​
    12·1 answer
  • The formula in cell C9 is B9*F10. On copying this formula to cell Z9, what will be the formula​
    5·1 answer
  • HELP NEEDED PLEASE HELP!!! ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!