no redo
no undo
redo but no undo
neither redo nor undo
A. no redo
Data security
Derived columns
Hiding of complex queries
All of the above
2NF
3NF
BCNF
4NF
It is a physical representation of the data.
It allows many to many relationship.
It is conceptually simple.
It will be the dominant database of the future.
Software
Server
Program
Client
Logical schema.
Physical schema.
Subschema.
None of the above.
building indices
pipelining
join ordering
none of the above
Chain
Network
Tree
Relational
Selection operator.
Projection operator.
Aggregation operators.
Division operator.
Total participation.
Multiple participation.
Cardinality N.
None of the above.
TOTAL
ADD
COUNT
SUM
data is defined separately and not included in programs.
programs are not dependent on the physical attributes of data
programs are not dependent on the logical attributes of data
both B and C
alter
update
set
create
BCNF
3NF
PJNF
DKNF
<>
<
=<
>=
Union.
Set difference.
Intersection.
All of the above.
detecting view serializability.
detecting conflict serializability.
deadlock prevention
deadlock detection
schema
instance of the database
data domain
independence
Government Union Internet
Graphical Unit Interface
Graphical User Interface
Graphical University Interface
Tuple
Cardinality
Degree
Domain
Raw data
Source
Information
Useful data
UPDATE S CITY = KANPUR WHERE SNO=S1
UPDATE S SET CITY = KANPUR FOR SNO=S1
UPDATE S SET CITY = KANPUR WHERE SNO=S1
UPDATE S RENAME CITY = KANPUR WHERE SNO=S1
It requires that an entity belongs to no more than one level entity set.
The same entity may belong to more than one level.
The database must contain an unmatched foreign key value.
An entity can be joined with another entity in the same level entity set.
Deferred update
Immediate update
Two-phase commit
Shadow paging
inner join
full outer join
right outer join
all of the above
Volatile
Non - Volatile
Logical
Physical
DISTINCT
NO DUPLICATE
UNIQUE
None of the above
Lost update problem.
Update anomaly.
Unrepeatable read.
Dirty read.
Single
Three
Two
None
(i) and (ii)
(iv) only
(i) and (iv)
(ii) and (iii)
Conceptual level data hiding.
External level data hiding.
Physical level data hiding.
None of these.