Discuss the functionality and importance of the Integrity Enhancement Feature (IEF).

What will be an ideal response?

Required data: NOT NULL of CREATE/ALTER TABLE.
Domain constraint: CHECK clause of CREATE/ALTER TABLE and CREATE

DOMAIN.

Entity integrity: PRIMARY KEY (and UNIQUE) clause of CREATE/ALTER

TABLE.

Referential integrity: FOREIGN KEY clause of CREATE/ALTER TABLE.
General constraints: CHECK and UNIQUE clauses of CREATE/ALTER TABLE and

(CREATE) ASSERTION.

Computer Science & Information Technology

You might also like to view...

Use a(n) ________ to format titles, headings, and paragraphs at one time

Fill in the blank(s) with correct word

Computer Science & Information Technology

Organizations must consider all but which of the following during development and implementation of an InfoSec measurement program?

A. Measurements must yield quantifiable information. B. Data that supports the measures needs to be readily obtainable. C. Only repeatable InfoSec processes should be considered for measurement. D. Measurements must be useful for tracking non-compliance by internal personnel.

Computer Science & Information Technology