Home

Immediate database modification technique uses

A. Both undo and redo.

B. Undo but no redo.

C. Redo but no undo.

D. Neither undo nor redo.

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. According to the levels of abstraction, the schema at the intermediate level is called
  2. DBMS is a collection of _____ that enables user to create and maintain a database.
  3. Which one is true statement :
  4. The full form of GUI is _________
  5. A ______ module is typically designed so that it will run on a user workstation or personal computer.
  6. The clause alter table in SQL can be used to
  7. Which of the following relational algebraic operations is not from set theory?
  8. The cost of reading and writing temporary files while evaluating a query can be reduced by
  9. A transaction is in state after the final statement has been executed.
  10. What is a disjoint less constraint?
  11. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
  12. ____specifies a search condition for a group or an aggregate.
  13. In a relational schema, each tuple is divided into fields called
  14. Which of the following is a reason to model data?
  15. The clause in SQL that specifies that the query result should be sorted in ascending or descending order…
  16. Which of the following constitutes a basic set of operations for manipulating relational data?
  17. Which of the following statement on the view concept in SQL is invalid?
  18. In E-R Diagram total participation is represented by
  19. Which of the following is not comparison operator?
  20. In multiple granularity of locks SIX lock is compatible with
  21. When an E-R diagram is mapped to tables, the representation is redundant for
  22. DBMS helps achieve
  23. The rule that a value of a foreign key must appear as a value of some specific table is called a
  24. Union operator is a :
  25. The _______ is a set of programs to use and / or modify this data.
  26. Immediate database modification technique uses
  27. Key to represent relationship between tables is called
  28. Checkpoints are a part of
  29. Data independence means
  30. ______is a special type of integrity constraint that relates two relations & maintains consistency across…