The statement that is executed automatically by the system as a side effect of the modification of the database is

A. backup

B. assertion

C. recovery

D. trigger

You can do it
  1. approach reduces time and effort required for design and lesser risk in database management.
  2. In SQL the word natural can be used with
  3. _____is a full form of SQL.
  4. Which of the following aggregate functions does not ignore nulls in its results?.
  5. The _______ is a set of programs to use and / or modify this data.
  6. In multiple granularity of locks SIX lock is compatible with
  7. ______contains information that defines valid values that are stored in a column or data type.
  8. Which of the following statement on the view concept in SQL is invalid?
  9. What are the desirable properties of a decomposition
  10. A list consists of last names, first names, addresses and pin codes. If all people in the list have…
  11. The middleware databases in which the business rules act are applicable to _______ tier architectures
  12. Which of the following is not comparison operator?
  13. A data type or format is specified for each _________
  14. A _____ is used to define overall design of the database
  15. What is data integrity?
  16. Key to represent relationship between tables is called
  17. Which of the following is not a consequence of concurrent operations?
  18. Which of the following addressing modes permits relocation without any change over in the code?
  19. Tree structures are used to store data in
  20. In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect…
  21. For using a specific database command is used.
  22. ______defines the structure of a relation which consists of a fixed set of attribute-domain pairs.
  23. The language that requires a user to specify the data to be retrieved without specifying exactly how…
  24. A relation is in attribute of other composite key. if an attribute of a composite key is dependent on…
  25. The data in the database at a particular moment of time is called the _______
  26. E-R Modeling is achieved by using ____ diagrams
  27. Checkpoints are a part of
  28. The full form of GUI is _________
  29. The ____ operator joins two or more conditions and displays rows only if that rows data satisfies all…
  30. The drawback of shadow paging technique are