Home

DFD stands for

A. Data Flow Document

B. Data File Diagram

C. Data Flow Diagram

D. Non of the above

You can do it
  1. HSAM stands for .
  2. What is a disjoint less constraint?
  3. Which of the following ensures the atomicity of the transaction?
  4. The statement that is executed automatically by the system as a side effect of the modification of the…
  5. Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum…
  6. The normalization was first proposed by .
  7. A ____ key specifies a uniqueness constraint that no two distinct tuples in any state r of relation…
  8. In SQL, testing whether a subquery is empty is done using
  9. By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0)…
  10. The _____ category includes storage media that can be operated on directly by the computers central…
  11. Maximum height of a B+ tree of order m with n key values is
  12. Employees in a company are each assigned their own office, i.e. for each employee there exists a unique…
  13. Which of the following is a reason to model data?
  14. _____ command can be used to modify a column in a table
  15. What will be the number of columns and rows respectively obtained for the operation, A- B, if A B are…
  16. DBMS helps achieve
  17. Which of the following is not a consequence of concurrent operations?
  18. approach reduces time and effort required for design and lesser risk in database management.
  19. Protection of data from unauthorized Disclosure results in loss of _______
  20. Which of the syntax is correct for insert statement? i) insert into values ii) insert into (column list)…
  21. Whenever two independent one-to-many relationships are mixed in the same relation, a __________ arises.
  22. Cascading rollback is avoided in all protocol except
  23. operator is used to compare a value to a list of literals values that have been specified.
  24. A _____ is used to define overall design of the database
  25. ______is a preferred method for enforcing data integrity
  26. Which of the following is true for network structure?
  27. Which one is correct statement?Logical data independence provides following without changing application…
  28. The clause alter table in SQL can be used to
  29. Checkpoints are a part of
  30. The data in the database at a particular moment of time is called the _______