Similar Collections


.

questions

Title
Data encryption techniques are particularly useful for
Before any changes to database structure are attempted one should first:
Which of the following modifications may not succeed?
Because of the importance of making data model changes correctly, many professionals are ________ about using an automated process for database redesign
Which of the following can cause a transaction failure
If the transaction can no longer continue with its normal execution because of some internal condition, it is called as a _________
If a system has entered and undesirable state due to which it is unable to continue with normal execution, it is called as _________
If there is a hardware malfunction or a bug in the database that causes the loss of content of volatile storage, it is called as ________
The assumption that the hardware errors bring the system to a halt is called as ________
Which of the following is not a classification of storage
If a failure has occurred in the midst of a transfer, it is called as _________
State true or false: The destination block has incorrect information in case of a total failure
The partitions of the database into fixed length storage units are called as __________
The blocks residing on the disk are referred to as ___________
The area of memory where blocks temporarily reside is called as ________
The most widely used structure for recording database modification is called as _______
An update log record describes a ________ database write
Which of the following fields does the update log record have?
The unique identifier of the transaction that performed the write operation is called as _______
The value of the data item prior to the write is called as _________
total questions: 95

Questions

95

Views

811

Best Answers

299

Points

5