Related Questions
What is the correct answer?
4
Which of the following is a reason to model data?
A. Understand each user's perspective of data
B. Understand the data itself irrespective of the physical representation
C. Understand the use of data across application areas
What is the correct answer?
4
DBMS helps achieve
A. Centralized control of data
What is the correct answer?
4
Consider the join of relation R with a relation S. If R has m tuples and S has n tuples, then the maximum and minimum size of the join respectively are
What is the correct answer?
4
What are the desirable properties of a decomposition
B. Dependency preservation.
What is the correct answer?
4
E-R Modeling is achieved by using ____ diagrams
What is the correct answer?
4
The graphical representation of a query is .
What is the correct answer?
4
By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0) or one (1).
What is the correct answer?
4
The _____ category includes storage media that can be operated on directly by the computers central processing unit.
What is the correct answer?
4
………………… approach reduces time and effort required for design and lesser risk in database management.
A. Single global database
What is the correct answer?
4
In multiple granularity of locks SIX lock is compatible with
What is the correct answer?
4
Cascading rollback is avoided in all protocol except
A. strict two-phase locking protocol.
C. two-phase locking protocol
D. validation based protocol.
What is the correct answer?
4
The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces a result of degree
What is the correct answer?
4
Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are
What is the correct answer?
4
The statement that is executed automatically by the system as a side effect of the modification of the database is
What is the correct answer?
4
A relation is in attribute of other composite key. if an attribute of a composite key is dependent on an
What is the correct answer?
4
Employees in a company are each assigned their own office, i.e. for each employee there exists a unique office and for each office there exists a unique employee; This statement is an example of ____ type of relation.
What is the correct answer?
4
The default level of consistency in SQL is
What is the correct answer?
4
The full form of GUI is _________
A. Government Union Internet
B. Graphical Unit Interface
C. Graphical User Interface
D. Graphical University Interface
What is the correct answer?
4
Which of the following ensures the atomicity of the transaction?
A. Transaction management component of DBMS
B. Application Programmer
C. Concurrency control component of DBMS
D. Recovery management component of DBMS
What is the correct answer?
4
In 2NF
A. No functional dependencies (FDs) exist.
B. No multivalued dependencies (MVDs) exist.
D. No partial MVDs exist.
What is the correct answer?
4
A table can have only one
What is the correct answer?
4
Which of the following is not a consequence of non-normalized database?
What is the correct answer?
4
The fact that all employees of a particular organization should not have salaries more than $10000 is a _____ constraint.
What is the correct answer?
4
The ______ indexes are forced to store only record IDs in the data structure and require at least one additional I/O Operation to retrieve the actual record.
What is the correct answer?
4
Which of the following is not a consequence of concurrent operations?
What is the correct answer?
4
Which of the following is not a characteristic of a relational database model?
C. Complex logical relationship
What is the correct answer?
4
Which of the following is not comparison operator?
What is the correct answer?
4
Relational Algebra does not have
C. Aggregation operators.
What is the correct answer?
4
Drop Table cannot be used to drop a table referenced by a ______ constraint.
What is the correct answer?
4
Manager salary details are hidden from the employee .This is
A. Conceptual level data hiding.
B. External level data hiding.
C. Physical level data hiding.