Question
a.
Unauthorised usage of data file
b.
Deadlock situation
c.
Data manipulation
d.
File pre-emption
Posted under UGC NET computer science question paper DBMS
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Usage of Preemption and Transaction Rollback prevents ..................
Similar Questions
Discover Related MCQs
Q. Views are useful for ................. unwanted information, and for collecting together information from more than one relation into a single view.
View solution
Q. Cross_tab displays permit users to view ................ of multidimensional data at a time.
View solution
Q. Thoma’s-write rule is .................
View solution
Q. .................. constraints ensure that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.
View solution
Q. The SQL expression
Select distinct T, branch_name from branch T, branch S where T.assets>S.assets and S.branch_city=”Mumbai”
finds the names of
View solution
Q. Consider the following schemas :
Branch_Schema = (branch_name, assets, city)
Customer_Schema = (cutstomer_name, street, city)
Deposit_Schema = (branch_name, account_number, customer_name, balance)
Borrow_Schema = (branch_name, loan_number, customer_name, amount)
Which of the following tuple relational calculus finds all customers who have loan amount more than Rs 12,000 ?
View solution
Q. Match the following :
(a) Create (i) The E-R Model
(b) Select (ii) Relationship Model
(c) Rectangle (iii) DDL
(d) Record (iv) DML
Codes :
(a) (b) (c) (d)
View solution
Q. Which of the following is not a type of Database Management System?
View solution
Q. Manager's salary details are to be hidden from Employee Table. This Technique is called as
View solution
Q. A Network Schema
View solution
Q. Which normal form is considered as adequate for usual database design?
View solution
Q. If D1, D2,…. Dn are domains in a relational model, then the relation is a table, which is a subset of
View solution
Q. Given an open address hash table with load factor a < 1, the expected number of probes in a successful search is
View solution
Q. The “PROJECT” operator of a relational algebra creates a new table that has always
View solution
Q. The employee information of an Organization is stored in the relation:
Employee (name, sex, salary, deptname)
Consider the following SQL query
Select deptname from Employee Where sex = ‘M’ group by deptname having avg (salary) > {select avg (salary) from Employee}
Output of the given query corresponds to
View solution
Q. For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
View solution
Q. Match the following:
a. Foreign keys i. Domain constraint
b. Private key ii. Referential integrity
c. Event control action model iii. Encryption
d. Data security iv. Trigger
Codes:
a b c d
View solution
Q. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
View solution
Q. What deletes the entire file except the file structure ?
View solution
Q. Which command is the fastest among the following ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond DBMS? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!