Home
You can do it
  1. Shadow paging has
  2. Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)
  3. The keyword to eliminate duplicate rows from the query result in SQL is
  4. A logical schema
  5. In 2NF
  6. A _____ is a logical unit of database processing that includes one or more data access operations that…
  7. Which of the following is not a consequence of non-normalized database?
  8. The normal form that is not necessarily dependency preserving is
  9. Which one is correct statement?Logical data independence provides following without changing application…
  10. The collection of information stored in a database at a particular moment is called as ......
  11. _____is a full form of SQL.
  12. Which of the following relational algebraic operations is not from set theory?
  13. The ______ language consists of SQL statements for operating on the data (insert, Modify, Delete) in…
  14. ………………… approach reduces time and effort required for design…
  15. The language that requires a user to specify the data to be retrieved without specifying exactly how…
  16. In a multi-user database, if two users wish to update the same record at the same time, they are prevented…
  17. The ______ indexes are forced to store only record IDs in the data structure and require at least one…
  18. An advantage of the database management approach is
  19. The clause alter table in SQL can be used to
  20. If an entity can belong to only one lower level entity then the constraint is
  21. In an ER model,_____ is described in the database by storing its data.
  22. The _______ is a set of programs to use and / or modify this data.
  23. Key to represent relationship between tables is called
  24. A transaction is in state after the final statement has been executed.
  25. Which normal form is considered adequate for normal relational database design?
  26. Given the following relation S(SNO,SNAME,CITY) write a query to update the value of CITY to KANPUR for…
  27. In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect…
  28. Cascading rollback is avoided in all protocol except
  29. Protection of data from unauthorized Disclosure results in loss of _______
  30. Which of the following statement on the view concept in SQL is invalid?