index
sequence
cursor
trigger
C. cursor
in 1NF also
in 2NF also
free from transitive dependencies
All of these
primary storage
secondary storage
tertiary storage
none of the above
Dotted rectangle
Square
Doubly outlined rectangle
Diamond
is allowed to pass them to others
is not allowed to pass them to others
may be or may not be allowed to pass them to others
none
read(), print()
read(), write()
scan(), write()
none of the above
Conceptual and view
Only physical
Physical and conceptual
Only conceptual
View
Cursor defination
Referential intergrity
Trigger
True
False
Cant say
none
smaller number of tables
higher query processing efficiency
reduced I/O for most queries
reduced data redundancy
Noise
Delay
Dispersion
Attenuation
Primary key
Secondary key
Candidate key
Foreign key
top-down approach.
bottom-up approach.
left-right approach.
none of the above
Granted
Committed
Compensated
Accomplished
empty
nonempty
contains null values
none of the above
Create information table in the Database
Insertion of new information into the Database
Deletion of information in the Database
Modification of information in the Database
strong entity set.
weak entity set.
simple entity set.
primary entity set.
Cartesian product
Difference
Intersection
Product
Storage manager
Admin
Transaction manager
none of the above
primary storage
secondary storage
tertiary storage
none of the above
4 NF
3 NF
2 NF
1 NF
Allow
Access
Grant
none of the above
Thermal
Intermodulation
Cross talk
Impulse
Insertion
Deletion
Update
All of the above
B-Tree File
Hashed File
Indexed File
Sequential file.
temporarily
permanently
none of these
all of the above
4 bits
8 bits
12 bits
32 bits
producing detail, summary, or exception reports.
recording a business activity.
confirming an action or triggering a response.
maintaining data.
IMAP
TELNET
POP3
Infrared
searching data
storing data
both A and B
none of these
is the entire database.
is a standard way of organizing information into accessible parts.
describes how data is actually stored on disk.
both A) and C)