Home

Protection of data from unauthorized Disclosure results in loss of _______

A. Integrity

B. Availability

C. Confidentiality

D. Discretionary Security

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. Data items grouped together for storage purposes are called a
  2. The fact that information in the data warehouse changes far less often and may be regarded as non-real-time…
  3. Which of the following is a reason to model data?
  4. Cascading rollback is avoided in all protocol except
  5. If both the functional dependencies : XY and YX hold for two attributes X and Y then the relationship…
  6. In b-tree the number of keys in each node is than the number of its children.
  7. For using a specific database …………… command is used.
  8. Wait-for graph is used for
  9. In E-R Diagram total participation is represented by
  10. operator is used to compare a value to a list of literals values that have been specified.
  11. DBMS is a collection of _____ that enables user to create and maintain a database.
  12. Checkpoints are a part of
  13. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
  14. Isolation of the transactions is ensured by
  15. Maximum height of a B+ tree of order m with n key values is
  16. If two relations R and S are joined, then the non matching tuples of both R and S are ignored in
  17. A _____ is used to define overall design of the database
  18. The middleware databases in which the business rules act are applicable to _______ tier architectures
  19. Which of the following is not a recovery technique?
  20. DBMS helps achieve
  21. In SQL, testing whether a subquery is empty is done using
  22. Relational Algebra does not have
  23. ______contains information that defines valid values that are stored in a column or data type.
  24. HSAM stands for ……….
  25. By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0)…
  26. The clause alter table in SQL can be used to
  27. The set of all values that can be taken by the attribute is called as _______ of the attribute.
  28. Manager salary details are hidden from the employee .This is
  29. The values of the attribute describes a particular
  30. Which normal form is considered adequate for normal relational database design?