adplus-dvertising
frame-decoration

Question

Database systems that store each relation in a separate operating system file may use the operating system’s authorization scheme, instead of defining a special scheme themselves. In this case, which of the following is false?

a.

The administrator enjoys more control on the grant option.

b.

It is difficult to differentiate among the update, delete and insert authorizations.

c.

Cannot store more than one relation in a file.

d.

Operations on the database are speeded up as the authorization procedure is carried out at the operating system level.

Answer: (a).The administrator enjoys more control on the grant option.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Database systems that store each relation in a separate operating system file may use the operating system’s authorization scheme, instead of defining a special scheme themselves....

Similar Questions

Discover Related MCQs

Q. Let R1(a, b, c) and R2(x, y, z) be two relations in which a is the foreign key of R1 that refers to the primary key of R2. Consider following four options.

(a) Insert into R1 (b) Insert into R2
(c) Delete from R1 (d) Delete from R2

Which of the following is correct about the referential integrity constraint with respect to above?

Q. Consider a hash table of size seven, with starting index zero, and a hash function (7x+3) mod 4. Assuming the hash table is initially empty, which of the following is the contents of the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Here “__” denotes an empty location in the table.

Q. Which of the following is/are true with reference to 'view' in DBMS?

(a) A 'view' is a special stored procedure executed when certain event occurs.
(b) A 'view' is a virtual table, which occurs after executing a pre-compiled query.

Q. In SQL, .................. is an Aggregate function.

Q. Match the following with respect to RDBMS:

List - I
(a) Entity integrity
(b) Domain integrity
(c) Referential integrity
(d) Userdefined integrity

List - II
(i) enforces some specific business rule that do not fall into entity or domain
(ii) Rows can't be deleted which are used by other records
(iii) enforces valid entries for a column
(iv) No duplicate rows in a table

Code:
(a) (b) (c) (d)

Q. In RDBMS, different classes of relations are created using ................... technique to prevent modification anomalies.

Q. .................. SQL command changes one or more fields in a record.

Q. If every non-key attribute is functionally dependent on the primary key, then the relation is in ....................

Q. Consider a relation R (A, B, C, D, E, F, G, H), where each attribute is atomic, and following functional dependencies exist.

CH → G
A → BC
B → CFH
E → A
F → EG

The relation R is ....................

Q. Given two relations R1(A, B) and R2(C, D), the result of following query
Select distinct A, B from R1, R2
is guaranteed to be same as R1 provided one of the following condition is satisfied.

Q. Consider a schema R(A, B, C, D) and following functional dependencies.

A → B
B → C
C → D
D → B

Then decomposition of R into R1(A, B), R2(B, C) and R3(B, D) is ..................