5.When pre cleaning policy is applied in memory management
Options: (A)A page is written out to secondary memory only when it has been selected for replacement. (B) Modified pages are written before their page frames are needed so that can be written out in batches. (C) A and B both true. (D) None of these. 9
You have run an SQL statement that asked the DBMS to display data in a table named USER_TABLES. The results include columns of data labeled "TableName," "NumberOfColumns" and "PrimaryKey." You are looking at ________ .
Options: (A)It require some type of handshaking between tasks that are sharing data . This can be explicitly structured in code by the programmer, or it may happen at a lower level unknown to the programmer. (B) It involves data sharing between more than two tasks, which are often specified as being members in a common group, or collective. (C) It involves two tasks with one task acting as the sender/producer of data, and the other acting as the receiver/consumer. (D) It allows tasks to transfer data independently from one another. 1
Options: (A)This takes only two values. In general, these values will be 0 and 1 and they can be coded as one bit. (B) The natural environment of a certain species (C) Systems that can be used without knowledge of internal operations (D) None of these 1
Which of the following are integrity controls that a DBMS may support?
Options: Assume a default value in a field unless a user enters a value for that field., Limit the set of permissible values that a field may assume., Limit the use of null values in some fields., All of the above.