Two-phase locking
Timestamped based locking
Graph-based locking
none of the above
C. Graph-based locking
300MHz
1GHz
5GHz
10 GHz
Thermal
Intermodulation
Cross talk
Impulse
i ,iii only
ii, iv only
iii, iv only
ii, iii, iv
top-down approach.
bottom-up approach.
left-right approach.
none of the above
either committed or aborted
either partially committed or aborted
either committed or failed
none of these
Hashed file
B-tree
Ordered file
Unordered file
Backup
Recovery
Grant
Troubleshooting
Logging
Recovery manager
Both A and B are true
Both A and B are false
Graph.
List.
Links.
Tree.
Electrically Extractable Programmable Read Only Memory
Electrically Erasable Programmable Read Only Memory
Electronically Erasable Programmable Read Only Memory
Electrically Erasable Programmable Read Only Memory
i, ii and iii only
i, ii and iv only
ii, iii and iv only
i, iii and iv only
physical level.
logical level.
conceptual level
view level.
top-down approach.
bottom-up approach.
left-right approach.
none of the above
controls relationships between operations of an object
controls relationships between instances of a class
controls relationships between attributes in a table
controls relationships between tables in a database
Super query
Sub query
Master query
Multi-query
parallel
serial
analog
digital
Failed
Aborted
Blocked
Finished
i only
ii only
Both A and B
None of the above
Primary key
Secondary key
Candidate key
Foreign key
Attributes
Multi-valued attributes
Weak entity set
Relationship sets
record
active data set
object
none of the above
Select
Update
Create
Alter
BCNF
Second
Third
Fourth
Left Right approach
Right Left approach
Top Down approach
Bottom Up approach
i and ii only
ii and iii only
i and iii only
All i, ii iii
Immediate database modification
Graph-based recovery
key dependencies
none of the above
Granted
Committed
Compensated
Accomplished
DBMS, same site
OS ,same site
DBMS ,different site
OS ,different site
insert
modify
lookup
none of the above
i, ii only
ii and iv only
ii and iv only
i, iv only