The drawback of shadow paging technique are

A. Commit overhead

B. Data fragmentation

C. Garbage collection

D. All of these

You can do it
  1. The data in the database at a particular moment of time is called the _______
  2. Which one is true statement :
  3. In 2NF
  4. The keyword to eliminate duplicate rows from the query result in SQL is
  5. Which one is correct statement?Logical data independence provides following without changing application…
  6. The transactions like adding an employee, enrolling a student in a course are examples of _______
  7. Which of the following relational algebraic operations is not from set theory?
  8. A data type or format is specified for each _________
  9. Which of the syntax is correct for insert statement? i) insert into values ii) insert into (column list)…
  10. Which of the following concurrency control schemes is not based on the serializability property?
  11. Wait-for graph is used for
  12. In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect…
  13. The fact that all employees of a particular organization should not have salaries more than $10000 is…
  14. It is an abstraction through which relationships are treated as higher level entities
  15. In SQL, testing whether a subquery is empty is done using
  16. Immediate database modification technique uses
  17. Which is the best file organization when data is frequently added or deleted from a file?
  18. Checkpoints are a part of
  19. The collection of information stored in a database at a particular moment is called as ......
  20. In SQL the statement select * from R, S is equivalent to
  21. According to the levels of abstraction, the schema at the intermediate level is called
  22. Given the following relation S(SNO,SNAME,CITY) write a query to update the value of CITY to KANPUR for…
  23. ______contains information that defines valid values that are stored in a column or data type.
  24. An outstanding functionality of SQL is its support for automatic_____ to the target data.
  25. A ______ module is typically designed so that it will run on a user workstation or personal computer.
  26. Isolation of the transactions is ensured by
  27. The normalization was first proposed by .
  28. What is a disjoint less constraint?
  29. Which of the following ensures the atomicity of the transaction?
  30. The normal form that is not necessarily dependency preserving is