Introduction to Database System In the DBM approach, application programs perform the processing functions all of the listed here access control storage function processing functions all of the listed here access control storage function ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Queries to a database can use aggregate functions like SUM and COUNT None of these are written in English All of these both (a) and (b) can use aggregate functions like SUM and COUNT None of these are written in English All of these both (a) and (b) ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time? data manipulation language None of these report writer query language transaction log data manipulation language None of these report writer query language transaction log ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System The different classes of relations created by the technique for preventing modification anomalies are called: normal forms. referential integrity constraints. functional dependencies. None of these normal forms. referential integrity constraints. functional dependencies. None of these ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which of the following is a serious problem of file management systems? program dependence difficult to update lack of data independence All of these data redundancy program dependence difficult to update lack of data independence All of these data redundancy ANSWER DOWNLOAD EXAMIANS APP
Introduction to Database System Which command is used to remove a table from the database in SQL? DELETE TABLE UNATTACH TABLE ERASE TABLE DROP TABLE DELETE TABLE UNATTACH TABLE ERASE TABLE DROP TABLE ANSWER DOWNLOAD EXAMIANS APP