Saturday, 10 September 2016

DBMS

DBMS

*    Usage of preemption and transaction rollback prevents.

a.     Unauthorized usage of data files
b.     Deadlock situation
c.      Data manipulation
d.     File preemption
Ans. Deadlock situation

*    Views are useful for ____ unwanted information and for collecting together information from more than one relation in a single view.

a.     Hiding
b.     Deleting
c.      Highlighting
d.     All above
Ans. Hiding

*    The decision tree classifier is widely used technique for.

a.     Classification
b.     Association
c.      Partition
d.     Clusters
Ans. Classification

*     Thoma’s write rule is ____.

a.     2-phase locking protocol
b.     1-phase locking protocol
c.      Time stamp ordering protocol
d.     Sliding window protocol
Ans. Time stamp ordering protocol





No comments:

Post a Comment