Problem
1. Using an example, explain how referential integrity is established during the creation of database tables?
2. Discuss the difference between triggers and stored procedures.
3. Discuss the distribution of application logic components across clients and servers in the client/server environment.
4. What are the most important security features for data management software?
5. What threats to data security must be addressed in a comprehensive data security plan?
6. What is the difference between shared locks and exclusive locks?