Skip to main content

INF503 WEEK-6 LESSON (18,20&21) LAB


 LESSON 18

1. Which search applies to any file, but all the other methods depend on having the appropriate access path on the attribute used in the selection condition?

A) .linear

2. . In which of the following joins does the search stop as soon as the first match is found and the tuple from outer relation is selected?

A) .Semi-join


Which of the following methods ends the iteration after all tuples that can be generated have been generated

A). Close()






LESSON 20

1. What will a transaction be called, if the database operations in a transaction do not update the database but only retrieve data?

A). Read-only

2 . In which of the following states does a transaction execute its READ and WRITE operations

A) . Active





LESSON 21


1.    Which of the following locks is too restrictive for database concurrency control purposes?

A) . Binary



2.    Which two-phase locking protocol is a deadlock-free protocol?


A) .Conservative




3 . Which phase of concurrency control checks whether any of the transactions violate serializability?

A ). Validation








LAB .18
1.
2.

SELECT COUNT(DISTINCT Dnumber)
FROM EMPLOYEE_REC E, EMPLOYEE_DEPARTMENT D
WHERE D.Dnumber = E.Dno and E.Salary > 40000;

 3. 

SELECT COUNT(*)
FROM EMPLOYEE_REC
WHERE EMPLOYEE_REC.Dno NOT IN (SELECT EMPLOYEE_DEPARTMENT.Dnumber
FROM EMPLOYEE_DEPARTMENT
WHERE Zipcode =30332);
4.
SELECT City FROM EMP_CUSTOMERS
INTERSECT
SELECT City FROM EMP_SUPPLIERS
 

ORDER BY City;


LAB 20


1. 


2.




LAB 21




































Comments

Popular posts from this blog

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...

IS5503 Cloud Computing Solutions

  Week-1 Pre Assessment 1) You are working as a cloud architect at Congruence crop. Management he asked you to implement an vitualized infrastructure to provide the company’s  employees with on-demand storage which should be accessible through a web interface over the public internet. Which of the following cloud deployment models will you use to implement this ? Private 2) Which of the following storage solutions saves space by eliminating files or blocks that have redundant data? Deduplication 3) You are as a cloud administrator at BigCo. Management he asked you to move the company’s on-premises data to the cloud. You have received a request from the network administration team while migrating. They want to manage both the Linux- and Windows-based servers efficiently. What should you implement to accomplish this task? Secure Shell Remote Desktop Protocol 4) Ron, a security analyst, found an unkwon design flaw in a product. He notices that correc...