Constraints
Triggers
Stored procedure
Cursors
A. Constraints
Network model.
Relational model.
Hierarchical model.
File based system.
Update Anomaly
Insertion Anomaly
Redundancy
Lost update problem
SQL
System
Nested
None of these
(i) and (ii)
(iv) only
(i) and (iv)
(ii) and (iii)
First normal form.
Second normal form.
Third normal form.
Fourth normal form.
Recovery measures.
Security measures.
Concurrency measures.
uthorization measures.
Government Union Internet
Graphical Unit Interface
Graphical User Interface
Graphical University Interface
Create table Employee(EMPNO int, EMPNAME char(10));
Create table Employee(EMPNO integer, EMPNAME String(10));
Create table Emplo(EMPNO number, EMPNAME string);
Create table Emp(EMPNO int, EMPNAME char(10));
backup
assertion
recovery
trigger
Conceptual, physical and internal
Conceptual, view and external
Logical, physical and internal
Logical, physical and view
Primary storage
Secondary Storage
All
Tertiary Storage
Relation
Tuple
Database
Domain
authorization and integrity manager
buffer manager
transaction manager
file manager
Raw data
Source
Information
Useful data
add an attribute
delete an attribute
alter the default values of an attribute
all of the above
Two - phase locking
Graph-based locking
Time-stamp based locking
None of these .
Functional dependency
Multi-valued dependency
Transitive dependency
Partial dependency
Query
Embedded SQL
DDL
DCL
TOTAL
ADD
COUNT
SUM
DISTINCT
UNIQUE
NULL
EXISTS
SQL server Profile
SQL server wizard.
SQL server service manager
SQL server setup
All views are not updateable
The views may be referenced in an SQL statement whenever tables are referenced.
The views are instantiated at the time they are referenced and not when they are defined.
The definition of a view should not have GROUP BY clause in it.
Understand each user's perspective of data
Understand the data itself irrespective of the physical representation
Understand the use of data across application areas
All of the above
detecting view serializability.
detecting conflict serializability.
deadlock prevention
deadlock detection
Commit overhead
Data fragmentation
Garbage collection
All of these
Data security
Derived columns
Hiding of complex queries
All of the above
Double lines
Single line
Dashed lines
Triangle
IX
IS
S
SIX
use database
database name use
Both A & B
None of them
Transaction management
Application programmer
Concurrency control
Recovery management