Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the  consistency and validity of the database.
A) Increases
B) Skips
C) Does not reduce
D) Reduces

1 Answer

Answer :

D) Reduces

Related questions

Description : Database applications were built directly on top of file system to overcome the following drawbacks of using file-systems (a) Data redundancy and inconsistency (b) Difficulty in accessing Data (c) Data isolation (d) Integrity problems (A) (a) (B) ... d) (C) (a), (b) and (c) (D) (a), (b), (c) and (d)

Last Answer : (D) (a), (b), (c) and (d) 

Description : he primary goal of the ………………….. protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints

Last Answer : B) Referential Integrity

Description : Which of the following was one of the weaker aspects of early cloud computing service offerings? a) Logging b) Integrity checking c) Consistency checking d) None of the mentioned

Last Answer : Logging

Description : The DBMS utility, ...................... allows to reconstruct the correct state of database from the backup and history of transactions. A) Backup B) Recovery C) Monitoring D) Data loading

Last Answer : B) Recovery

Description : DBMS provides the facility of accessing data from a database through (A) DDL (B) DML (C) DBA (D) Schema 

Last Answer : (B) DML

Description : ………………… approach reduces time and effort required for design and lesser risk in database management. A) Single global database B) Top-down approach C) Multiple databases D) None of the above

Last Answer : C) Multiple databases

Description : Recording of capital contributed by the owner as liability ensures the adherence of principle of– (A) Consistency (B) Going concern (C) Separate entity (D) Materiality

Last Answer : Answer: Separate entity

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : When a teacher ensures that students complete an exercise in mathematics and makes sure instructions are clear and specific. The teacher ensures the ........ aspect of assessment Options: A) A Validity B) Practicality C) Reliability D) Wash-back effect

Last Answer : A) A Validity 

Description : Which of the following statement is correct? Options: A) Reliability ensures validity B) Validity ensures reliability C) Reliability and validity are independent of each other D) Reliability does not depend on objectivity

Last Answer : C) Reliability and validity are independent of each other 

Description : Which of the following statement is correct ? (A) Reliability ensures validity (B) Validity ensures reliability (C) Reliability and validity are independent of each other (D) Reliability does not depend on objectivity

Last Answer : Answer: B  These two terms, reliability and validity, are often used interchangeably when they are not related to statistics. When critical readers of statistics use these terms, however, they refer to different ... step on it) but will not be valid, since it is not reading your actual weight. 

Description : Which of the following is a type of criterion–related validity evidence? a. Concurrent evidence b. Predictive evidence c. Internal consistency d. Both a and b are correct answers

Last Answer : d. Both a and b are correct answers

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : ome of the utilities of DBMS are ............. i) Loading ii) Backup iii) File organization iv) Process Organization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv

Last Answer : B) i, ii and iii only

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

Last Answer : C) It should avoid/reduce the redundancy.

Description : Which of the following ACID property states that the system must go from one known state to another and that the system integrity must be maintained? a) Atomicity b) Consistency c) Isolation d) Durability

Last Answer : Consistency

Description : Being conscientious, admitting mistakes, and knowing one's strengths and limitations are the skills associated with _______. (a) Competence ; (b) consistency ; (c) loyalty ; (d) integrity

Last Answer : (a) Competence ;

Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock : I. 2-phase locking II. Time phase ordering (A) Both I & II (B) II only (C) I only (D) Neither I nor II

Last Answer : (B) II only

Description : Which of the following concurrency protocol ensures both conflict serializability and freedom from deadlock ? (a) 2-phase Locking (b) Time stamp - ordering (A) Both (a) and (b) (B) (a) only (C) (b) only (D) Neither (a) nor (b)

Last Answer : (C) (b) only

Description : Which of the following statement(s) is/are TRUE with regard to software testing? I. Regression testing technique ensures that the software product runs correctly after the changes during maintenance. II. Equivalence partitioning is a ... (1) only I (2) only II (3) both I and II (4) neither I nor II

Last Answer : (1) only I 

Description : The practitioner makes a critical assessment of validity of audit evidence, with a questioning mind and being alert to conditions which may indicate possible misstatement due to error or ... integrity b. Professional skepticism c. Independence is mental attitude d. Sufficient appropriate evidence

Last Answer : Professional skepticism

Description : Which design metric is used to measure the compactness of the program in terms of lines of code? (A) Consistency (B) Conciseness (C) Efficiency (D) Accuracy

Last Answer : (B) Conciseness

Description : A good thesis writing should involve: (a) reduction of punctuation and grammatical errors to a minimum. (b) careful checking of references. (c) consistency in the way the thesis is written. (d) a clear and well written abstract. Select ... c) and (d) (C) (a), (b) and (c) (D) (a), (b) and (d)

Last Answer : Answer: B

Description : Explain Database Management. What are the features of DBMS? -Technology

Last Answer : It refers to the software that is responsible for storing, maintaining and utilising a database. It enables a user to define, create and maintain the database and provide controlled access on it. A ... Data security e.g. MS-Access, Corel Paradox, Lotus Approach, MySQL, OpenOffice.org Base etc.

Description : DBMS is a program that controls the creation, maintenance and use of database. Here, DBMS referred to -Technology

Last Answer : (c) Here, DBMS stands for Database Management System.

Description : What is DBMS or Database Management System ?

Last Answer : DataBase Management System is the full form of DBMS . DBMS is a set of programs required for accessing , storing , controlling and managing interconnected information called database management systems.

Description : There arecertain packages that allow people to define data items, place these items in particular records, combine therecords into designated files and then manipulate and retrieve the storeddata. What arethey ... (DBMS) C. Batch processingsystem D. Data communication package E. None of the above

Last Answer : Database management system (DBMS)

Description : DBMS is a collection of ………….. that enables user to create and maintain a database. A) Keys B) Translators C) Program D) Language Activity

Last Answer : C) Program

Description : In a Database Managemnt System (DBMS), the content and the location of the data is defined by the ____. (1) Multi Dimensional data (2) Sequence data (3) Meta data (4) Sub data

Last Answer : Meta data

Description : Which strategy used to promote qualitative research validity uses multiple research methods to study a phenomenon? a. Data triangulation b. Methods triangulation c. Theory triangulation d. Member checking

Last Answer : b. Methods triangulation

Description : The use of multiple observers to allow cross-checking of observations to make sure that the investigators agree with what took place is known as a. Interpretive validity b. Researcher bias c. Multiple operationalism d. Investigator triangulation

Last Answer : d. Investigator triangulation

Description : In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : A) Confidentiality

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as A) Data Security B) Domain access C) Data Control

Last Answer : C) Data Control

Description : .............. requires that data should be made available to only authorized users. A) Data integrity B) Privacy C) Security D) None of the above

Last Answer : C) Security

Description : Which if the following is not the type of data integrity. A) Key integrity B) Domain integrity C) Entity integrity D) Referential integrity

Last Answer : A) Key integrity

Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : The ……………. is used to provide integrity check, authentication and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : An ER Model includes I. An ER diagram portraying entity types. II. Attributes for each entity type III. Relationships among entity types. IV. Semantic integrity constraints that reflects the business rules about data not ... ; IV (B) I&IV (C) I, II & IV (D) I & III

Last Answer : (A) I, II, III & IV

Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint

Last Answer : (A) Integrity constraint

Description : In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency

Last Answer : (C) Entity Integrity

Description : As far as surgical removal of wisdom teeth is concerned which of the following is true? a- Prophylactic prescription of antibiotic reduces dramatically the chances of infection. b- Raising a lingual ... e- The use of vasoconstrictors in local anaesthetics will increase the chances of infection.

Last Answer : b- Raising a lingual flap will increases the incidence of neurapraxia but will reduce the incidence of neurotmesis with respect to the lingual nerve.

Description : As far as surgical removal of wisdom teeth is concerned, which of the following is true?**CHECK A. Prophylactic prescription of antibiotic reduces dramatically the chances of infection B. Raising ... root E. The use of vasoconstrictors in local anaesthetics will increase the chances of infection.

Last Answer : C. Prophylactic prescription of dexamethasone will dramatically reduces post operative swelling