Processed data is called _____

A. Raw data

B. Source

C. Information

D. Useful data

You can do it yup
  1. In an ER model,_____ is described in the database by storing its data.
  2. The language that requires a user to specify the data to be retrieved without specifying exactly how…
  3. A list consists of last names, first names, addresses and pin codes. If all people in the list have…
  4. A data type or format is specified for each _________
  5. A table can have only one
  6. Immediate database modification technique uses
  7. For correct behaviour during recovery, undo and redo operation must be
  8. Drop Table cannot be used to drop a table referenced by a ______ constraint.
  9. In an ER diagram the ___shape specifies the Attibute and a ____ shape specifies the primary key attribute.
  10. Which of the following is not a logical database structure?
  11. What is data integrity?
  12. _____clause is an additional filter that is applied to the result.
  13. DFD stands for
  14. The cost of reading and writing temporary files while evaluating a query can be reduced by
  15. Which of the following relational algebraic operations is not from set theory?
  16. What is a disjoint less constraint?
  17. Maximum height of a B+ tree of order m with n key values is
  18. If the closure of an attribute set is the entire relation then the attribute set is a
  19. A top-to-bottom relationship among the items in a database is established by a
  20. ………………… approach reduces time and effort required for design…
  21. If a transaction T has obtained an exclusive lock on item Q, then T can
  22. Which one is true statement :
  23. Which of the following concurrency control schemes is not based on the serializability property?
  24. In a relational schema, each tuple is divided into fields called
  25. What are the desirable properties of a decomposition
  26. Between DRAM and magnetic disk storage another form of memory, called ______ memory is becoming common…
  27. Which of the following is true for network structure?
  28. Relational Algebra is
  29. The middleware databases in which the business rules act are applicable to _______ tier architectures
  30. The drawback of shadow paging technique are