logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Database Systems Comments

  • Question
  • The modify operation is likely to be done after


  • Options
  • A. Delete
  • B. Look-up
  • C. Insert
  • D. All of the above
  • E. None of the above

  • Correct Answer
  • Look-up 


  • Database Systems problems


    Search Results


    • 1. Versatile report generators can provide

    • Options
    • A. Columnar totals
    • B. Subtotals
    • C. Calculations
    • D. All of the above
    • E. None of the above
    • Discuss
    • 2. In SQL, which command is used to remove a stored function from the database?

    • Options
    • A. REMOVE FUNCTION
    • B. DELETE FUNCTION
    • C. DROP FUNCTION
    • D. ERASE FUNCTION
    • E. None of the above
    • Discuss
    • 3. One approach to standardizing storing of data

    • Options
    • A. MIS
    • B. structured programming
    • C. CODASYL specifications
    • D. All of the above
    • E. None of the above
    • Discuss
    • 4. Which command is used to select distinct subject (SUB) from the table (BOOK)?

    • Options
    • A. SELECT ALL FROM BOOK
    • B. SELECT DISTINCT SUB FROM BOOK
    • C. SELECT SUB FROM BOOK
    • D. All of the above
    • E. None of the above
    • Discuss
    • 5. The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in

    • Options
    • A. a tree file
    • B. an indexed file
    • C. a hashed file
    • D. a sequential file
    • E. None of the above
    • Discuss
    • 6. What software packages are commonly used for businesses that have to track extensive lists of clients and inventory?

    • Options
    • A. Special purpose packages
    • B. Custom made programs
    • C. Single function application packages
    • D. Data management packages
    • E. None of the above
    • Discuss
    • 7. The _____ command is used to allocates an extent for the table in SQL

    • Options
    • A. MODIFY ALLOCATES
    • B. MODIFY TABLE
    • C. ALTER TABLE
    • D. REDEFINE TABLE
    • E. None of the above
    • Discuss
    • 8. Data encryption techniques are particularly useful for

    • Options
    • A. reducing storage space requirements
    • B. improving data integrity
    • C. protecting data in data communication systems
    • D. All of the above
    • E. None of the above
    • Discuss
    • 9. In order to use a record management system

    • Options
    • A. You need to understand the low-level details of how information in stored
    • B. You need to understand the model the record management system uses.
    • C. Both (a) and (b)
    • D. All of the above
    • E. None of the above
    • Discuss
    • 10. A logical schema

    • Options
    • A. is the entire database
    • B. is a standard way of organizing information into accessible parts
    • C. describes how data is actually stored on disk
    • D. All of the above
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment