Hierarchic Standard Access Method
Hierarchic Sequential Access Method
Hierarchic Sequential and Method
Hierarchic Standard and Method
B. Hierarchic Sequential Access Method
Single global database
Multiple databases
Top-down approach
None of the above
Transaction management
Application programmer
Concurrency control
Recovery management
Entity
Attribute
Relationship
Notation
Chain
Network
Tree
Relational
It is the data contained in database that is non redundant.
It is the data contained in database that is accurate and consistent.
It is the data contained in database that is secured.
It is the data contained in database that is shared.
the pin code
the last name
the compound key first name and last name
Tr from next page
Default
Index
Rule
View
It requires that an entity belongs to no more than one level entity set.
The same entity may belong to more than one level.
The database must contain an unmatched foreign key value.
An entity can be joined with another entity in the same level entity set.
data redundancy increases
data is dependent on programs
data is integrated and can be accessed by multiple programs
none of the above
Software
Server
Program
Client
authorization and integrity manager
buffer manager
transaction manager
file manager
Union
Intersection
Difference
Join
repeatable read
read committed
read uncommitted
serializable
A database design may be ambiguous.
It should avoid/reduce the redundancy.
Unrelated data should be in the same table so that updating the data will be easy.
An entity should not have attributes.
jamming
password
documentation
record lock
inner join
full outer join
right outer join
all of the above
BCNF
3NF
PJNF
DKNF
Hierarchic Standard Access Method
Hierarchic Sequential Access Method
Hierarchic Sequential and Method
Hierarchic Standard and Method
Sequential
Direct
Index sequential
None of the above
First normal form.
Second normal form.
Third normal form.
Fourth normal form.
one less
same
one more
half
Recovery measures.
Security measures.
Concurrency measures.
uthorization measures.
Partition constraint.
Dependency preservation.
Redundancy.
Security.
Instance
Program
Schema
Super Key
M:N
M:1
1:M
Update Anomaly
Insertion Anomaly
Redundancy
Lost update problem
strict two-phase locking protocol.
tree locking protocol
two-phase locking protocol
validation based protocol.
read Q
write Q
both read and write Q
write Q but not read Q
Data Flow Document
Data File Diagram
Data Flow Diagram
Non of the above
OR
AND
NOT
ALL