Related Questions
What is the correct answer?
4
In defining the notion of the tuple variable, which one of the clause is useful?
What is the correct answer?
4
An operation that will increase the length of a list is
What is the correct answer?
4
Data fragmentation is performed by the …… and each fragment is stored at…………..
What is the correct answer?
4
A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit
What is the correct answer?
4
DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions
What is the correct answer?
4
A logical description of some portion of database that is required by a user to perform task is called as
What is the correct answer?
4
In which of the random-access method, stations do not sense the medium?
What is the correct answer?
4
The physical path over which a message travels
What is the correct answer?
4
A logical schema
A. is the entire database.
B. is a standard way of organizing information into accessible parts.
C. describes how data is actually stored on disk.
What is the correct answer?
4
Which of the following is not a database object?
What is the correct answer?
4
Which of the following is the unit of signaling speed or modulation rate or the rate of symbol transmission?
What is the correct answer?
4
B-Tree is used for
What is the correct answer?
4
What does a field or a combination of fields that has a unique value called ?
What is the correct answer?
4
The index table has …… Columns.
What is the correct answer?
4
Which of the following file organization provides very fast access to any arbitrary record of a file?
What is the correct answer?
4
Commit operation …………… writes the changes made to the database.
What is the correct answer?
4
In ………… paging we make copy of the current page table.
What is the correct answer?
4
By default a user who has been granted some form of authorization
A. is allowed to pass them to others
B. is not allowed to pass them to others
C. may be or may not be allowed to pass them to others
What is the correct answer?
4
The ________ states that a foreign key must either match a primary key value in another relation or it must be null.
B. referential integrity constraint
What is the correct answer?
4
The method of access which uses key transformation is known as
What is the correct answer?
4
Noisy channel has ……… .. types of protocols
What is the correct answer?
4
Only one communication channel is needed rather than n channels to transmit data between two communicating devices
What is the correct answer?
4
File organization that provides fast access to any arbitrary record
What is the correct answer?
4
It is possible to define a schema completely using
What is the correct answer?
4
Datalog is
A. procedural query language
B. nonprocedural query language
What is the correct answer?
4
Which of the following layer uses trailer of the frame for error detection?
What is the correct answer?
4
............... noise is caused by the random motion of the electrons in a wire and is avoidable.
What is the correct answer?
4
The ability to modify the conceptual schema without causing any change to the application program is known as
A. Physical data independence
B. Logical data independence
C. External data independence
What is the correct answer?
4
In E-R Diagram weak entity set are represented by
What is the correct answer?
4
Which command is used to cancel privileges granted through the GRANT command ?