Raw data
Source
Information
Useful data
C. Information
Primary Key
Local Key
Foreign Key
Composite Key
All views are not updateable
The views may be referenced in an SQL statement whenever tables are referenced.
The views are instantiated at the time they are referenced and not when they are defined.
The definition of a view should not have GROUP BY clause in it.
data redundancy increases
data is dependent on programs
data is integrated and can be accessed by multiple programs
none of the above
detecting view serializability.
detecting conflict serializability.
deadlock prevention
deadlock detection
DFD
Flowcharts
Gantt Charts
E-R
With finer degree of granularity of locking a high degree of concurrency is possible.
Locking prevents non-serializable schedules.
Locking cannot take place at field level.
An exclusive lock on data item X is granted even if a shared lock is already held on X.
Relation
Tuple
Database
Domain
COUNT .
COUNT (*)
MAX
MIN
Network model.
Relational model.
Hierarchical model.
File based system.
Two - phase locking
Graph-based locking
Time-stamp based locking
None of these .
2NF
5NF
4NF
3NF
Single global database
Multiple databases
Top-down approach
None of the above
Partition constraint.
Dependency preservation.
Redundancy.
Security.
View
Order by
Group by
Having
Sub
Parent
Candidate
Super
Table
Tree like structure
Complex logical relationship
Records
theta join
outer join
natural join
composed join
Primary storage
Secondary Storage
All
Tertiary Storage
ALTER TABLE Staff ALTER position DROP DEFAULT;
ALTER TABLE Staff ALTER position DEFAULT;
ALTER TABLE Staff ALTER DROP DEFAULT;
MODIFY Staff ALTER position DROP DEFAULT;
building indices
pipelining
join ordering
none of the above
Clustered
Hashed
Un-clustered
Collision
primary key
secondary key
foreign key
none of the above
First normal form.
Second normal form.
Third normal form.
Fourth normal form.
Sequential
Direct
Index sequential
None of the above
TCL
DCL
DDL
DML
2NF
3NF
BCNF
1NF
Default
Index
Rule
View
Understand each user's perspective of data
Understand the data itself irrespective of the physical representation
Understand the use of data across application areas
All of the above
authorization and integrity manager
buffer manager
transaction manager
file manager
Domain Integrity Constraints
Referential Integrity Constraints
Domain Constraints
Entity Integrity Constraints