The middleware databases in which the business rules act are applicable to _______ tier architectures

A. Single

B. Three

C. Two

D. None

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. The statement that is executed automatically by the system as a side effect of the modification of the…
  2. DFD stands for
  3. A relation is in attribute of other composite key. if an attribute of a composite key is dependent on…
  4. The data models defined by ANSI/SPARC architecture are
  5. The values of the attribute describes a particular
  6. The ______ language consists of SQL statements for operating on the data (insert, Modify, Delete) in…
  7. The fact that all employees of a particular organization should not have salaries more than $10000 is…
  8. The default level of consistency in SQL is
  9. The clause alter table in SQL can be used to
  10. It is an abstraction through which relationships are treated as higher level entities
  11. A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer…
  12. Which of the following is not a consequence of non-normalized database?
  13. By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0)…
  14. Wait-for graph is used for
  15. Which of the following is not a recovery technique?
  16. A data type or format is specified for each _________
  17. Which of the following is not comparison operator?
  18. ____ table store information about database or about the system.
  19. Immediate database modification technique uses
  20. The _______ is a set of programs to use and / or modify this data.
  21. _____ database is used to provide statistical information or summaries of values based on various criteria.
  22. Protection of data from unauthorized Disclosure results in loss of _______
  23. DROP is a statement in SQL.
  24. Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
  25. For using a specific database …………… command is used.
  26. The relational model is based on the concept that data is organized and stored in two-dimensional tables…
  27. DBMS is a collection of _____ that enables user to create and maintain a database.
  28. A relational database developer refers to a record as
  29. Which of the following is not a characteristic of a relational database model?
  30. The drawback of shadow paging technique are