Question
a.
Retrieve
b.
Backup
c.
Recovery
d.
Deadlock
Posted under DBMS
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Copying files to secondary or specific devices is known as ______
Similar Questions
Discover Related MCQs
Q. How many types of recovery control techniques:
View solution
Q. Which are types of recovery control techniques:
View solution
Q. Which server can joins the indexes when only multiple indexes combined can cover the query:
View solution
Q. In concurrency control policy the the lock is obtained on
View solution
Q. A concurrency-control policy such as this one leads to ______ performance, since it forces transactions to wait for preceding transactions to finish before they can start.
View solution
Q. __________ are used to ensure that transactions access each data item in order of the transactions’ ____ if their accesses conflict.
View solution
Q. EMPDET is an external table containing the columns EMPNO and ENAME. Which command would work in relation to the EMPDET table?
View solution
Q. In which scenario would you use the ROLLUP operator for expression or columns within a GROUP BY clause?
View solution
Q. Which statement is true regarding external tables?
View solution
Q. A non-correlated subquery can be defined as ______
View solution
Q. Which of the following is not a property of transactions?
View solution
Q. SNAPSHOT is used for (DBA)
View solution
Q. Isolation of the transactions is ensured by
View solution
Q. Constraint checking can be disabled in existing _______________ and _____________ constraints so that any data you modify or add to the table is not checked against the constraint.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond DBMS? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!