Home

A table can have only one

A. Secondary key

B. Alternate key

C. Unique key

D. Primary key

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. _____is a full form of SQL.
  2. The common column is eliminated in
  3. Cascading rollback is avoided in all protocol except
  4. Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.
  5. The keyword to eliminate duplicate rows from the query result in SQL is
  6. Which of the following is not a recovery technique?
  7. The _____ category includes storage media that can be operated on directly by the computers central…
  8. HSAM stands for ……….
  9. operator is used to compare a value to a list of literals values that have been specified.
  10. A top-to-bottom relationship among the items in a database is established by a
  11. DROP is a statement in SQL.
  12. The _______ is a set of programs to use and / or modify this data.
  13. A _____ is a logical unit of database processing that includes one or more data access operations that…
  14. Protection of data from unauthorized Disclosure results in loss of _______
  15. ____ table store information about database or about the system.
  16. What will be the number of columns and rows respectively obtained for the operation, A- B, if A B are…
  17. In multiple granularity of locks SIX lock is compatible with
  18. In SQL the statement select * from R, S is equivalent to
  19. In an E-R diagram double lines indicate
  20. Key to represent relationship between tables is called
  21. The graphical representation of a query is .
  22. A list consists of last names, first names, addresses and pin codes. If all people in the list have…
  23. Wait-for graph is used for
  24. The clause in SQL that specifies that the query result should be sorted in ascending or descending order…
  25. In b-tree the number of keys in each node is than the number of its children.
  26. For correct behaviour during recovery, undo and redo operation must be
  27. The middleware databases in which the business rules act are applicable to _______ tier architectures
  28. The data models defined by ANSI/SPARC architecture are
  29. Isolation of the transactions is ensured by
  30. In an ER model,_____ is described in the database by storing its data.