Question: 33. Both deferred update and immediate update requires redoing all write item operations of transactions a. started after the checkpoint. b. uncommitted (active) at system

33. Both deferred update and immediate update requires redoing all write item operations of transactions a. started after the checkpoint. b. uncommitted (active) at system crash. c. committed after the last checkpoint. d. committed before the last checkpoint. 34. Data warehousing differs from transaction-based databases in that it is oftene a. distributed. b. serving thousands of users. c. good enough for businesses. d. read-access only. 35. Statistical database security techniques prohibits a. the use of statistical queries. b. the use of aggregate functions.- c. getting statistics from individual information. d. inferring individual information from statistical queries. 36. The assumption that a MAC number is registered by a manufacturer and cannot be used another manufacturer is represented by the functional dependency a. MAC-> manufacturer. b. manufacturer ->MAC. c. both. d. neither. 37. An attribute is nonprime if it is not a member of any a. partial key. b. primary key.^ d. candidate key.* 38. In BCNF, every nontrivial FD has a superkey on the left-hand side. 3NF allows additional FDs if their right-hand side is ae c. nonprime attribute.e d. prime attribute. a. b. key.4 39. The frequent-pattern tree growth algorithm is more efficient than the apriori algorithm in analyzing a. social-network data. b. market-basket data. c. three-dimensional data. d. graph data. 40. In the basic timestamp ordering, r1x fails ife a. readTS(X) > TS(1). b. read TS(X) IS(1). c. write. ?$(X) IS(1). el
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
