Earn $100 Online Daily. Work From Home. Click Here

What is the correct answer?


In multiple granularity of locks SIX lock is compatible with



C. S


Related Questions

Maximum height of a B+ tree of order m with n key values is ______is a special type of integrity constraint that relates two relations… The language that requires a user to specify the data to be retrieved… Processed data is called _____ In b-tree the number of keys in each node is than the number of its children. In SQL the statement select * from R, S is equivalent to The normalization was first proposed by . Which of the following relational algebraic operations is not from set… If a transaction T has obtained an exclusive lock on item Q, then T can Whenever two independent one-to-many relationships are mixed in the same… An advantage of the database management approach is Which of the following is not a consequence of concurrent operations? The collection of information stored in a database at a particular moment… A data type or format is specified for each _________ In an ER model,_____ is described in the database by storing its data. In SQL the word natural can be used with In a multi-user database, if two users wish to update the same record… If both the functional dependencies : XY and YX hold for two attributes… The middleware databases in which the business rules act are applicable… HSAM stands for ………. _____ command can be used to modify a column in a table Data items grouped together for storage purposes are called a _____clause is an additional filter that is applied to the result. Wait-for graph is used for operator is used to compare a value to a list of literals values that… Protection of data from unauthorized Disclosure results in loss of _______ Which of the following is not a recovery technique? In an E-R, Y is the dominant entity and X is a subordinate entity. Then… According to the levels of abstraction, the schema at the intermediate… A list consists of last names, first names, addresses and pin codes. If…