Related Questions
What is the correct answer?
4
Which of the following is not comparison operator?
What is the correct answer?
4
The graphical representation of a query is .
What is the correct answer?
4
The rule that a value of a foreign key must appear as a value of some specific table is called a
A. Referential constraint.
D. Functional dependency.
What is the correct answer?
4
The size of a data item is called its _______, which can be a field of some record or may be a larger unit such as a record.
What is the correct answer?
4
The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces a result of degree
What is the correct answer?
4
The fact that all employees of a particular organization should not have salaries more than $10000 is a _____ constraint.
What is the correct answer?
4
Which one is true statement :
A. With finer degree of granularity of locking a high degree of concurrency is possible.
B. Locking prevents non-serializable schedules.
C. Locking cannot take place at field level.
D. An exclusive lock on data item X is granted even if a shared lock is already held on X.
What is the correct answer?
4
Manager salary details are hidden from the employee .This is
A. Conceptual level data hiding.
B. External level data hiding.
C. Physical level data hiding.
What is the correct answer?
4
_____ is a utility to capture a continuous record of server activity and provide auditing capability.
C. SQL server service manager
What is the correct answer?
4
Tree structures are used to store data in
What is the correct answer?
4
Which of the following relational algebraic operations is not from set theory?
What is the correct answer?
4
____ table store information about database or about the system.
What is the correct answer?
4
A table can have only one
What is the correct answer?
4
Relational Algebra is
A. Data Definition Language .
C. Procedural query Language
What is the correct answer?
4
As per equivalence rules for query transformation, selection operation distributes over
What is the correct answer?
4
The _______ is a set of programs to use and / or modify this data.
What is the correct answer?
4
The metadata is created by the
What is the correct answer?
4
Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
What is the correct answer?
4
DBMS helps achieve
A. Centralized control of data
What is the correct answer?
4
DFD stands for
What is the correct answer?
4
What will be the number of columns and rows respectively obtained for the operation, A- B, if A B are Base union compatible and all the rows of a are common to B? Assume A has 4 columns and 10 rows; and B has 4 columns and 15 rows
What is the correct answer?
4
Immediate database modification technique uses
D. Neither undo nor redo.
What is the correct answer?
4
Change Staff table by removing default of Assistant for position column
A. ALTER TABLE Staff ALTER position DROP DEFAULT;
B. ALTER TABLE Staff ALTER position DEFAULT;
C. ALTER TABLE Staff ALTER DROP DEFAULT;
D. MODIFY Staff ALTER position DROP DEFAULT;
What is the correct answer?
4
Assume transaction A holds a shared lock R. If transaction B also requests for a shared lock on R.
A. It will result in a deadlock situation.
B. It will immediately be rejected.
C. It will immediately be granted.
D. It will be granted as soon as it is released by A .
What is the correct answer?
4
The relational model is based on the concept that data is organized and stored in two-dimensional tables called ______
What is the correct answer?
4
Which of the following is not a property of transactions?
What is the correct answer?
4
E-R Modeling is achieved by using ____ diagrams
What is the correct answer?
4
Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum and minimum size of the join respectively are
What is the correct answer?
4
______is a special type of integrity constraint that relates two relations & maintains consistency across the relations.
A. Domain Integrity Constraints
B. Referential Integrity Constraints
D. Entity Integrity Constraints
What is the correct answer?
4
A ______ module is typically designed so that it will run on a user workstation or personal computer.