Академический Документы
Профессиональный Документы
Культура Документы
a. Binary locks
b. Phantom read
c. Dynamic hashing
d. Buffer manager
e. Remote backup
a. Functional dependency
c. Closure of attributes
d. Armstrong axioms
e. Serializable schedules.
1. Fetching past the last row of a cursor
A. True
B. False
C. NULL
D. None
A. Procedure
B. Constraints
C. Views
D. Synonyms
8. Consider the following four options from a single statement. Which of the
following lines in the SELECT
statement below contain an error.
9. User ‘Janko’ would like to insert a row into the Emp table, which has 3
columns: empid, lastname, salary.
The user would like to enter data for empid 59694, lastname Harry, but no
salary. Which statement would
work best.
A. After
B. Instead of
C. Statement
D. Pre-Insert
12. Which of the following is one of the benefits of using procedures and
functions
A. ER diagram
B. Records
C. Relations
D. Hierarchy
14. A table can have maximum _____________ no. Of Long Raw datatype columns
A. One
B. No limit
C. 255
D. depends on tablespace
15. A user is setting up a join operation between Emp and Dept tables. The
query should return all the
employees, which are assigned dept, as well as the employees which are yet
not assigned any dept.
True
False
The relational
database
model is based
on concepts
proposed in
the 1960s and
1970s.
True
False
True
False
A first step in database creation should be needs analysis.
True
False
True
False
ISAM is a _________structure.