DBMS
Usage of preemption and transaction rollback prevents.
a. Unauthorized usage of data files
b. Deadlock situation
c. Data manipulation
d. File preemption
Ans.
Deadlock situation
Views are useful for ____ unwanted
information and for collecting together information from more than one relation
in a single view.
a. Hiding
b. Deleting
c. Highlighting
d. All above
Ans. Hiding
The decision tree classifier is
widely used technique for.
a. Classification
b. Association
c. Partition
d. Clusters
Ans.
Classification
Thoma’s write rule is ____.
a. 2-phase locking protocol
b. 1-phase locking protocol
c. Time stamp ordering protocol
d. Sliding window protocol
Ans. Time
stamp ordering protocol
No comments:
Post a Comment