Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Control Files :The redo and control files logs support the rest of the architecture. Every database must have at least one control file, although you have more than one to guard against replace. The control file records the name of the dataset, the time and date it was prepared, the location of the redoes logs and database, and the synchronization information to confirm that all three groups of files are always in step. Each time you include a new redo log file or database to the database, the information is recorded in the control files.
Explain the EXEC statement in SQL Ans: All statements which start with EXEC SQL are embedded SQL database statements. High level languages such as C can be employed to write a
What are uncommitted modifications? The immediate-modification technique permits database modifications to be output to the database whereas the transaction is still in the act
intent locking
what is specialization?
Explain CNT in the respects of QBE ? CNT: It is one of the aggregation commands given in QBE. It is used to identify number of tuples
Explain the dependency relationship of object oriented A dependency is a relationship which states that a change in specification of one thing can affect another thing, but n
Define Outer join Outer join - If there are any type of values in the one table that do not have corresponding value(s) in the other, in an equi-join which will not be selected
Difference between SQL and SQL*Plus SQL SQL*Plus SQL is a language SQL *Plus is an environment It is bas
What is meant by log-based recovery? The most widely used structures for recording database changes is the log. The log is a sequence of log records, recording all the update a
What is a hashing function? What are the properties of a good hashing function? Describe the folding technique for hashing functions. Ans: Hashing function is a method
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd