Two - phase locking
Graph-based locking
Time-stamp based locking
None of these .
D. None of these .
Select
Order by
Group-by
Having
Deferred update
Immediate update
Two-phase commit
Shadow paging
Recovery measures.
Security measures.
Concurrency measures.
uthorization measures.
Commit overhead
Data fragmentation
Garbage collection
All of these
IX
IS
S
SIX
system indexes
syst indexes
sys indexes
sysind
2NF
5NF
4NF
3NF
Volatile
Non - Volatile
Logical
Physical
Secondary key
Alternate key
Unique key
Primary key
Primary
Foreign
Candidate
Alternate
2NF
3NF
BCNF
4NF
Double lines
Single line
Dashed lines
Triangle
Indirect addressing
Indexed addressing
PC relative addressing
Base register addressing
Lost update problem.
Update anomaly.
Unrepeatable read.
Dirty read.
Hierarchical schema
Network schema
Relational Schema
All of the above
an attribute
a tuple
a criteria
a relation
read Q
write Q
both read and write Q
write Q but not read Q
Entity
Attribute
Relationship
Notation
B-Tree
graph
Query Tree
directed graph
weak entity sets
weak relationship sets
strong entity sets
strong relationship sets
SQL server Profile
SQL server wizard.
SQL server service manager
SQL server setup
Sequential
Direct
Index sequential
None of the above
Logm(n)
(m+n)/2
Logm/2(m+n)
None of these
Single global database
Multiple databases
Top-down approach
None of the above
Data Definition Language .
Meta Language
Procedural query Language
None of the above
TCL
DCL
DDL
DML
Serializable schedule.
Recoverable schedule.
Deadlock free schedule.
Cascadeless schedule.
It is the data contained in database that is non redundant.
It is the data contained in database that is accurate and consistent.
It is the data contained in database that is secured.
It is the data contained in database that is shared.
Domain Integrity Constraints
Referential Integrity Constraints
Domain Constraints
Entity Integrity Constraints
alter
update
set
create