Home
Current Affairs January 2024

What is the correct answer?

4

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. Field-level lock

B. Row-level lock

C. Table-level lock

D. Database-level lock

Correct Answer :

A. Field-level lock


Related Questions

What is the correct answer?

4

Technique(s) used for data recovery after any failure

A. Logging

B. Recovery manager

C. Both A and B are true

D. Both A and B are false

What is the correct answer?

4

The class based addressing is known as

A. Classless addressing

B. Classful addressing

C. Classified addressing

D. Classical addressing

What is the correct answer?

4

Which one of the following statements is false?

A. The data dictionary is normally maintained by the database administrator.

B. Data elements in the database can be modified by changing the data dictionary.

C. The data dictionary contains the name and description of each data element.

D. The data dictionary is a tool used exclusively by the database administrator.

What is the correct answer?

4

Unwanted energy from source other than the transmitter.

A. Attenuation

B. Distortion

C. Delay

D. Noise

What is the correct answer?

4

Secondary storage

A. magnetic disk

B. magnetic tape

C. juke box

D. cache

What is the correct answer?

4

The left outer join takes all tuples

A. in the left relation which didnt match with any tuple in right relation

B. in the left relation which matched with a tuple in right relation

C. in the right relation which didnt match with any tuple in left relation

D. in the right relation which matched with a tuple in left relation

What is the correct answer?

4

.................. means sending a digital signal over a channel without changing the digital signal to an analog signal.

A. Baseband transmission

B. Broadband transmission

C. Digital transmission

D. Analog transmission

What is the correct answer?

4

In this data model each record can hae more than one parent

A. Hierarchical model

B. E-R model

C. Network based model

D. none of these

What is the correct answer?

4

In client/server computing data are

A. sent only upon the client's request

B. sent in complete copies for the client to filter and sort

C. never sent to the client machine

D. sent in very large sections to save processing time

What is the correct answer?

4

The host part in a class A type of an IP address has

A. 12 bits

B. 16 bits

C. 24 bits

D. 28 bits

What is the correct answer?

4

A transaction is said to have terminated if it has

A. either committed or aborted

B. either partially committed or aborted

C. either committed or failed

D. none of these

What is the correct answer?

4

The output of the Data Definition Language is stored in the

A. view table

B. schema

C. metadata

D. all of the above.

What is the correct answer?

4

FDDI protocol operates in
i) Transport layer
ii) Network layer
iii) Datalink layer
iv) Physical layer

A. i and ii only

B. ii and iii only

C. i and iii only

D. iii and iv only

What is the correct answer?

4

Which of the following is not proper state of transaction ?

A. Partially aborted

B. Partially committed

C. Aborted

D. Committed

What is the correct answer?

4

A type of query that is placed within a WHERE or HAVING clause of another query is called

A. Super query

B. Sub query

C. Master query

D. Multi-query

What is the correct answer?

4

The union of primary keys of a related entity becomes …………. Of a relation.

A. primarykey

B. superkey

C. candidatekey

D. foreignkey

What is the correct answer?

4

Which of the following is not an Aggregate function?

A. Min

B. Max

C. Select

D. Avg

What is the correct answer?

4

Symbol to represent weak entity set in ER Model

A. Dotted rectangle

B. Square

C. Doubly outlined rectangle

D. Diamond

What is the correct answer?

4

The number of cursors depend on the

A. number of queries

B. number of attributes

C. size of memory area

D. none of these

What is the correct answer?

4

Technique used in log based recovery

A. Immediate database modification

B. Graph-based recovery

C. key dependencies

D. none of the above

What is the correct answer?

4

As a side-effect of database update ,the system automatically executes a statement called

A. a view

B. a grant permission

C. a trigger

D. all of the above

What is the correct answer?

4

Select the incorrect statement

A. View is derived from other tables.

B. Once a transaction has executed commit work its effect cant be undone by rollback work .

C. The input to the aggregate function avg can be non numeric data types

D. A primary key can never be null.

What is the correct answer?

4

Which one of the following is provided by a data dictionary ?

A. User data

B. Database structure data

C. Sorted data

D. Functional data

What is the correct answer?

4

A subschema expresses

A. the logical view.

B. the physical view.

C. the external view.

D. all of the above.

What is the correct answer?

4

DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions

A. Backup

B. Recovery

C. Grant

D. Troubleshooting

What is the correct answer?

4

DECLARE is a(an)

A. executable statement.

B. declarative statement.

C. Ordered file

D. none of the above

What is the correct answer?

4

Benefit of database normalization is

A. smaller number of tables

B. higher query processing efficiency

C. reduced I/O for most queries

D. reduced data redundancy

What is the correct answer?

4

State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only

B. ii and iii only

C. i and iii only

D. None of these

What is the correct answer?

4

The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is

A. Normalization

B. Indexing

C. Enforcing referential integrity

D. Enforcing data integrity

What is the correct answer?

4

The minimal set of super key is called

A. Primary key

B. Secondary key

C. Candidate key

D. Foreign key