adplus-dvertising
frame-decoration

Question

Data integrity control

a.

is used to set upper and lower limits on numeric data

b.

requires the use of passwords to prohibit unauthorized access to the file

c.

has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files

d.

All of the above

Posted under Concurrency Control DBMS

Answer: (c).has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Data integrity control

Similar Questions

Discover Related MCQs

Q. The type of constraints that specifies the uniqueness of data stored in the database are considered as

Q. The property of DBMS which ensures the execution of all the operations in transaction or none of the operation is executed is classified as

Q. The control feature in database management system which ensures the accuracy of data updated by multiple users is classified as

Q. The property of DBMS which ensures whether the hundreds of applications are executed, each transaction must be executed in isolation is classified as

Q. If a transaction has obtained a __________ lock, it can read but cannot write on the item

Q. If a transaction has obtained a ________ lock, it can both read and write on the item

Q. A transaction can proceed only after the concurrency control manager ________ the lock to the transaction

Q. If a transaction can be granted a lock on an item immediately in spite of the presence of another mode, then the two modes are said to be ________

Q. A transaction is made to wait until all ________ locks held on the item are released

Q. State true or false: It is not necessarily desirable for a transaction to unlock a data item immediately after its final access

Q. The situation where no transaction can proceed with normal execution is known as ________

Q. The protocol that indicates when a transaction may lock and unlock each of the data items is called as __________

Q. If a transaction Ti may never make progress, then the transaction is said to be ____________

Q. The two phase locking protocol consists which of the following phases?

Q. If a transaction may obtain locks but may not release any locks then it is in _______ phase

Q. If a transaction may release locks but may not obtain any locks, it is said to be in ______ phase

Q. A system is in a _______ state if there exists a set of transactions in which every transaction is waiting for another transaction in the set.

Q. Which of the following is not a method in deadlock handling

Q. Deadlocks can be prevented using

Q. State true or false: Wait die scheme is a non-preemptive technique