MCQOPTIONS
Home
About Us
Contact Us
Bookmark
Saved Bookmarks
Testing Subject
General Aptitude
Logical and Verbal Reasoning
English Skills Ability
Technical Programming
Current Affairs
General Knowledge
Finance & Accounting
GATE (Mechanical Engineering)
Chemical Engineering
→
DBMS Mcqs
→
Advanced SQL Mcqs
→
The method of access that uses key transformation...
1.
The method of access that uses key transformation is called as
A.
Direct
B.
Hash
C.
Random
D.
Sequential
Answer» C. Random
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
In timestamp ordering protocol, suppose that the transaction Ti issues read(Q) and TS(Ti)
In timestamp ordering protocol, suppose that the transaction Ti issues write(Q) and TS(Ti)
The type of constraints that specifies the uniqueness of data stored in the database are considered as
The property of DBMS which ensures the execution of all the operations in transaction or none of the operation is executed is classified as
The control feature in database management system which ensures the accuracy of data updated by multiple users is classified as
The property of DBMS which ensures whether the hundreds of applications are executed, each transaction must be executed in isolation is classified as
In crabbing protocol the the lock obtained on the root node is in _________ mode.
Instead of locking index leaf nodes in a two-phase manner, some index concurrency-control schemes use ___________ on individual key values, allowing other key values to be inserted or deleted from the same leaf.
The extent of the database resource that is included with each lock is called the level of
Evaluate the CREATE TABLE statement:CREATE TABLE products(product_id NUMBER(6) CONSTRAINT prod_id_pk PRIMARY KEY, product_name VARCHAR2(15));Which statement is true regarding the PROD_ID_PK constraint?
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies