Login
Remember
Register
MCQ Village Q&A
Questions
Unanswered
Categories
Ask a Question
Ask a Question
Recent questions and answers in DSA
0
votes
1
answer
95
views
consider a disk with a sector size of 512 bytes, 2000 tracks per surface,50 sectors per track
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
106
views
Once the head has reached the desired track, the time spent waiting for the sector to be accessed to
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
113
views
A type of non-volatile memory which erases data in units and then rewrites data at the byte level is
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
122
views
The disk platters mounted on a spindle and the heads mounted on a disk arm are together known as
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
99
views
The procedure of choosing a suitable query out of all the queries is classified as
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
180
views
Access to the database by unauthorized users is referred to as
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
141
views
Authentication refers to
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
91
views
XML Schema is commonly known as?
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
174
views
To construct an XML document two main structuring concepts are used
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
102
views
The grants privileges on SQL authorization mechanism does not have
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
103
views
______ is an attack which forces an end user to execute unwanted actions on a web application in which
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
332
views
When we update any tuple in the relation which Authorization on a relation allows a user to?
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
188
views
Prevention of access to the database by unauthorized users is referred to as :
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
105
views
To revoke an authorization, we use the statement
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
112
views
If a transaction obtains a shared mode lock on a data item Q, ____________.
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
277
views
In perspective of Desirable properties of transaction which of the following is true
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
294
views
If we are taking about transaction states which of the following is true
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
145
views
Which of the following is true if two transactions in a schedule are said to be conflicting
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
0
votes
1
answer
112
views
Consider a disk with a sector size of 512 bytes, 2000 tracks per surface,50 sectors per track
answered
Aug 6, 2023
in
DSA
by
Admin
(
0
points)
dsa
Help get things started by
asking a question
.
2.8k
questions
2.8k
answers
0
comments
76
users
Welcome to MCQ Village Q&A, where you can ask questions and receive answers from other members of the community.
Recent questions and answers in DSA
Ask a question:
...