一起答
单选

某公司数据库中的元件关系模式为P(元件号,元件名称,供应商,供应商所在地,库存量),函数依赖集F如下所示:F={元件号→元件名称,(元件号,供应商)→库存量,供应商→供应商所在地}元件关系的主键为(54),该关系存在冗余以及插入异常和删除异常等问题。为了解决这一问题需要将元件关系分解(55),分解后的关系模式可以达到(56)。

  • A.1NF
  • B.2NF
  • C.3NF
  • D.4NF
参考答案
查看试卷详情
相关试题
  1. In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

    • An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typicall
    • In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capab
    • A.components
    • B.users
    • C.mechanisms
    • D.algorithms
  2. In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

    • An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typicall
    • In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capab
    • A.remote
    • B.native
    • C.controlled
    • D.Automated
  3. In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

    • An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typicall
    • In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capab
    • A.denied
    • B.permitted
    • C.prohibited
    • D.rejected
  4. In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

    • An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typicall
    • In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capab
    • A.open
    • B.monitor
    • C.grant
    • D.seek
  5. In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).

    • An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typicall
    • In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capab
    • A.cooperates
    • B.coordinates
    • C.connects
    • D.mediates
  6. 在下图的SNMP配置中,能够响应Manager2的getRequest请求的是()。

    • A.Agentl
    • B.Agent2
    • C.Agent3
    • D.Agent4
  7. 某PC的Internet协议属性参数如下图所示,默认网关的IP地址是()。

    • A.8.8.8.8
    • B.202.117.115.3
    • C.192.168.2.254
    • D.202.117.115.18
  8. 默认情况下,FTP服务器的控制端口为(66),上传文件时的端口为(67)。

    • A.大于1024的端口
    • B.20
    • C.80
    • D.21
  9. 使用ping命令可以进行网络检测,在进行一系列检测时,按照由近及远原则,首先执行的是()。

    • A.ping默认网关
    • B.ping本地IP
    • C.ping127.0.0.1
    • D.ping远程主机
  10. 默认情况下,FTP服务器的控制端口为(66),上传文件时的端口为(67)。

    • A.大于1024的端口
    • B.20
    • C.80
    • D.21