sponsored links
Keeping organizational information in a file-processing system has a number of major disadvantages. Which one of the following is a major disadvantage?
- Data consistency
- Efficient data access
- Data isolation
- Concurrent access
In a relational schema, each tuple is divided into fields called _________________
In a FD the right side contains only attributes that also appear on the left side is Called ________
It may not be possible to store certain information unless some other, unrelated information is stored as well is called ______________
It may not be possible to delete certain information without losing some other, unrelated information as well is called _________________
A top - do - bottom relationship among the items in a database is established by a ____________________
Schema definition is a function of _____________________
Which of the following one is example of a integrity constraints
- Multilevel dependency
- Insertion dependency
- Multivalued dependency
- Deletion dependency
A record management system always uses a _______ as it's model
________ is more than one place within a database can occur
A relation with redundancy can be refined by ----------- using with smaller relations that contain the same information but without redundancy.
The collection of data-containing information relevant to an enterprise is referred as ______________.
If one copy of such repeated data is updates, an inconsistency is created unless all copies are similarly updated is called
The complex low-level data structures description is provided at _ _ _ _ _ _ _ _ _ level
Some information is stored repeatedly is called
In a large DBMS, each user can ___________ a small part of the entire data base.
File system suffers with integrity problems. Integrity problems are due to
Since data are scattered in various files, writing a new application programs to retrieve the appropriate data is difficult. It is known as problems of ________.
Data abstraction can be provided using _________________
In file processing system, only one mechanism can be implemented for security, That is _______________.
Read complete study materials for upcoming IBPS IT Officers Online Exam from here
sponsored links
Thanks. Please post more
ReplyDeletethanks...
ReplyDeletethanks a lot madam.
ReplyDeleteThanks a lot. These posts are very useful for IT Officers Exam.
ReplyDeletePlease post more such questions.
Once again Thank you very much.................................AVINASH
thank you so much
ReplyDeletethank u so much.
ReplyDeleteplease people share your experience of today's ITofficer exam..in IT section, which chapter covered the maximum question
ReplyDelete