7 years ago in Database Management System

Composition is a stronger form of which of the following?

[A] Aggregation
[B] Encapsulation
[C] Inheritance
[D] All of the above.
Loading...
Next Question

Overall Stats

Attempted 142
Correct 24
Incorrect 33
Viewed 85

Answers

Guest
Guest
Shourya Singh Rawat
Shourya Singh Rawat - 4 years ago

Shourya Singh Rawat from India is saying Encapsulation is correct answer

Muhammad Jamshed Mahmood
Muhammad Jamshed Mahmood - 4 years ago

Muhammad Jamshed Mahmood from Lahore, Pakistan is saying Aggregation is correct answer

Imran Ali
Imran Ali - 4 years ago

Imran Ali from Rawalpindi, Pakistan is saying Encapsulation is correct answer

Zara Ghafoor
Zara Ghafoor - 4 years ago

Zara Ghafoor from Faisalabad, Pakistan is saying Aggregation is correct answer

ranaasif
ranaasif - 4 years ago

ranaasif from Multan, Pakistan is saying All of the above. is correct answer

Related Questions

An abstract class is which of the following?

  • [A] A class that has direct instances, but whose descendants may have direct instances.
  • [B] A class that has no direct instances, but whose descendants may have direct instances.
  • [C] A class that has direct instances, but whose descendants may not have direct instances.
  • [D] A class that has no direct instances, but whose descendants may not have direct instances

The level of data abstraction which describes how the data is actually stored is?

  • [A] Physical level
  • [B] Conceptual level
  • [C] Storage Level
  • [D] File level

The ability to modify the conceptual schema without causing any change to the application program is known as :

  • [A] Physical data independence
  • [B] Logical data independence
  • [C] External data independence
  • [D] Static data

An intrusion detection system does not perform which of the following?

  • [A] Tries to identify attempts to hack into a computer system.
  • [B] May monitor packets passing over the network.
  • [C] May transmit message packets to the correct destination.
  • [D] Set up deception systems that attempt to trap hackers.