When using ________-key encryption, only the message sender and recipient have the code

Fill in the blank(s) with correct word

private

Computer Science & Information Technology

You might also like to view...

You can create a ___________ at the same time as you perform regular Windows backups

a. Startup disk b. Scheduled task c. System image d. Repair disk

Computer Science & Information Technology

Map the object-oriented design for the Hotel case study produced in Exercise 27.22 to the ODMG ODL.

class Hotel { (extent hotels key hotelNo) attribute string hotelNo; attribute string hotelName; attribute string city; relationship set Contains inverse Room::ContainedIn; … } class Room { (extent rooms key hotelNo, roomNo) attribute string hotelNo; attribute string roomNo; attribute string hotelName; attribute string city; relationship ContainedIn inverse Hotel::Contains; relationship set Gets inverse Booking::MadeFor; changeRoomPrice(in roomNo:string, in float) raises(noSuchRoom); changeRoomType(in roomNo:string, in char) raises(noSuchRoom); … } class Guest { (extent guests key guestNo) attribute string guestNo; attribute string guestName; attribute string guestAddress; relationship set Makes inverse Booking::MadeFor; Show how the following queries would be written in OQL: (a) List all hotels. (b) List all single rooms with a price below £20.00 per night. (c) List the names and addresses of all guests. (d) List the price and type of all rooms at the Grosvenor Hotel. (e) List all guests currently staying at the Grosvenor Hotel. (f) List the details of all rooms at the Grosvenor Hotel, including the name of the guest staying in the room, if the room is occupied. (g) List the guest details (guestNo, name and address) of all guests staying at the Grosvenor Hotel.

Computer Science & Information Technology