MCQOPTIONS
Bookmark
Saved Bookmarks
→
Computer Fundamentals
→
Boolean Functions in Computer Fundamentals
→
The method of access which uses key transformation..
1.
The method of access which uses key transformation is known as
A.
Hash
B.
Direct
C.
Sequential
D.
Random
Answer» B. Direct
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
Object=_________+relationships.
A model developed by Hammer and Mc Leod in 1981.
DBMS manages the interaction between __________ and database.
Hierarchical model is also called
To delete a particular column in a relation the command used is:
_________ data type can store unstructured data
The collection of information stored in a database of a particular moment is ____________
The method of access which uses key transformation is known as
In E-R diagram generalization is represented by
The ______ operator is used to compare a value to a list of literals values that have beenspecified.
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply