Home

………………… approach reduces time and effort required for design and lesser risk in database management.

A. Single global database

B. Multiple databases

C. Top-down approach

D. None of the above

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Checkpoints are a part of
  2. The _______ is a set of programs to use and / or modify this data.
  3. If a transaction T has obtained an exclusive lock on item Q, then T can
  4. The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces…
  5. It is an abstraction through which relationships are treated as higher level entities
  6. Relationships among relationships can be represented in an-E-R model using
  7. Which of the following ensures the atomicity of the transaction?
  8. The normal form that is not necessarily dependency preserving is
  9. In SQL the word natural can be used with
  10. The size of a data item is called its _______, which can be a field of some record or may be a larger…
  11. Wait-for graph is used for
  12. A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer…
  13. If an entity can belong to only one lower level entity then the constraint is
  14. Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.
  15. Tree structures are used to store data in
  16. The transactions like adding an employee, enrolling a student in a course are examples of _______
  17. The drawback of shadow paging technique are
  18. Change Staff table by removing default of Assistant for position column
  19. In SQL, testing whether a subquery is empty is done using
  20. Maximum height of a B+ tree of order m with n key values is
  21. Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)
  22. operator is used to compare a value to a list of literals values that have been specified.
  23. The rule that a value of a foreign key must appear as a value of some specific table is called a
  24. Shadow paging has
  25. A relation is in attribute of other composite key. if an attribute of a composite key is dependent on…
  26. ______ keyword is used to find the number of values in a column.
  27. A top-to-bottom relationship among the items in a database is established by a
  28. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
  29. Which of the syntax is correct for insert statement? i) insert into values ii) insert into (column list)…
  30. The graphical representation of a query is .