Checkpoints are a part of

A. Recovery measures.

B. Security measures.

C. Concurrency measures.

D. uthorization measures.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Grant and revoke are _____ statements.
  2. The drawback of shadow paging technique are
  3. In SQL, testing whether a subquery is empty is done using
  4. Which of the following is not a consequence of concurrent operations?
  5. Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.
  6. The normalization was first proposed by .
  7. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
  8. The set of all values that can be taken by the attribute is called as _______ of the attribute.
  9. Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)
  10. Which of the following is not a characteristic of a relational database model?
  11. E-R Modeling is achieved by using ____ diagrams
  12. ____specifies a search condition for a group or an aggregate.
  13. Relational Algebra does not have
  14. The _____ category includes storage media that can be operated on directly by the computers central…
  15. Which one is correct statement?Logical data independence provides following without changing application…
  16. Maximum height of a B+ tree of order m with n key values is
  17. Employees in a company are each assigned their own office, i.e. for each employee there exists a unique…
  18. ______is a special type of integrity constraint that relates two relations & maintains consistency across…
  19. Union operator is a :
  20. The _______ is a set of programs to use and / or modify this data.
  21. The cost of reading and writing temporary files while evaluating a query can be reduced by
  22. If both the functional dependencies : XY and YX hold for two attributes X and Y then the relationship…
  23. A data type or format is specified for each _________
  24. SQL server stores index information in the _____system table
  25. _____is a full form of SQL.
  26. DFD stands for
  27. Which of the following is not a recovery technique?
  28. Whenever two independent one-to-many relationships are mixed in the same relation, a __________ arises.
  29. A _____ is used to define overall design of the database
  30. Dependency preservation is not guaranteed in