Login
Remember
Register
MCQ Village Q&A
Questions
Unanswered
Categories
Ask a Question
Ask a Question
Recent questions and answers in DSA
0
votes
1
answer
100
views
consider a disk with a sector size of 512 bytes, 2000 tracks per surface,50 sectors per track
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
111
views
Once the head has reached the desired track, the time spent waiting for the sector to be accessed to
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
119
views
A type of non-volatile memory which erases data in units and then rewrites data at the byte level is
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
128
views
The disk platters mounted on a spindle and the heads mounted on a disk arm are together known as
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
104
views
The procedure of choosing a suitable query out of all the queries is classified as
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
184
views
Access to the database by unauthorized users is referred to as
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
147
views
Authentication refers to
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
96
views
XML Schema is commonly known as?
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
179
views
To construct an XML document two main structuring concepts are used
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
106
views
The grants privileges on SQL authorization mechanism does not have
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
108
views
______ is an attack which forces an end user to execute unwanted actions on a web application in which
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
335
views
When we update any tuple in the relation which Authorization on a relation allows a user to?
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
193
views
Prevention of access to the database by unauthorized users is referred to as :
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
109
views
To revoke an authorization, we use the statement
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
117
views
If a transaction obtains a shared mode lock on a data item Q, ____________.
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
282
views
In perspective of Desirable properties of transaction which of the following is true
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
299
views
If we are taking about transaction states which of the following is true
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
148
views
Which of the following is true if two transactions in a schedule are said to be conflicting
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
115
views
Consider a disk with a sector size of 512 bytes, 2000 tracks per surface,50 sectors per track
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
Help get things started by
asking a question
.
2.8k
questions
2.8k
answers
0
comments
76
users
Welcome to MCQ Village Q&A, where you can ask questions and receive answers from other members of the community.
Recent questions and answers in DSA
Ask a question:
...