Home
Current Affairs January 2024

What is the correct answer?

4

A ______ module is typically designed so that it will run on a user workstation or personal computer.

A. Software

B. Server

C. Program

D. Client

Correct Answer :

D. Client


Related Questions

What is the correct answer?

4

What will be the number of columns and rows respectively obtained for the operation, A- B, if A B are Base union compatible and all the rows of a are common to B? Assume A has 4 columns and 10 rows; and B has 4 columns and 15 rows

A. 4,0

B. 0,0

C. 4,5

D. 8,5

What is the correct answer?

4

The data models defined by ANSI/SPARC architecture are

A. Conceptual, physical and internal

B. Conceptual, view and external

C. Logical, physical and internal

D. Logical, physical and view

What is the correct answer?

4

Relationships among relationships can be represented in an-E-R model using

A. Aggregation

B. Association

C. Weak entity sets

D. Weak relationship sets

What is the correct answer?

4

_____ database is used to provide statistical information or summaries of values based on various criteria.

A. Statistical

B. Mathematical

C. Normalized

D. Un normalized

What is the correct answer?

4

_____ First proposed the process of normalization.

A. Edgar. W

B. Edward Stephen

C. Edgar F. Codd

D. Edward Codd

What is the correct answer?

4

Which of the syntax is correct for insert statement?
i) insert into values
ii) insert into (column list) values

A. i-only

B. ii-only

C. Both of them

D. None of them

What is the correct answer?

4

Grant and revoke are _____ statements.

A. TCL

B. DCL

C. DDL

D. DML

What is the correct answer?

4

Between DRAM and magnetic disk storage another form of memory, called ______ memory is becoming common because it is non volatile.

A. RAM

B. Flash

C. Hard Disk

D. Secondary

What is the correct answer?

4

Cascading rollback is avoided in all protocol except

A. strict two-phase locking protocol.

B. tree locking protocol

C. two-phase locking protocol

D. validation based protocol.

What is the correct answer?

4

______defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

A. Instance

B. Program

C. Schema

D. Super Key

What is the correct answer?

4

Checkpoints are a part of

A. Recovery measures.

B. Security measures.

C. Concurrency measures.

D. uthorization measures.

What is the correct answer?

4

A relation is in attribute of other composite key. if an attribute of a composite key is dependent on an

A. 2NF

B. 3NF

C. BCNF

D. 1NF

What is the correct answer?

4

____specifies a search condition for a group or an aggregate.

A. GROUP BY Clause

B. HAVING Clause

C. FROM Clause

D. WHERE Clause

What is the correct answer?

4

______contains information that defines valid values that are stored in a column or data type.

A. Default

B. Index

C. Rule

D. View

What is the correct answer?

4

The ______ indexes are forced to store only record IDs in the data structure and require at least one additional I/O Operation to retrieve the actual record.

A. Clustered

B. Hashed

C. Un-clustered

D. Collision

What is the correct answer?

4

An outstanding functionality of SQL is its support for automatic_____ to the target data.

A. programming

B. navigation

C. functioning

D. notification

What is the correct answer?

4

As per equivalence rules for query transformation, selection operation distributes over

A. Union.

B. Set difference.

C. Intersection.

D. All of the above.

What is the correct answer?

4

Which two files are used during operation of the DBMS?

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language

What is the correct answer?

4

_____is a full form of SQL.

A. Standard query language

B. Sequential query language

C. Structured query language

D. Server side query language

What is the correct answer?

4

If the closure of an attribute set is the entire relation then the attribute set is a

A. superkey

B. candidate key

C. primary key

D. not a key

What is the correct answer?

4

The middleware databases in which the business rules act are applicable to _______ tier architectures

A. Single

B. Three

C. Two

D. None

What is the correct answer?

4

A ____ key specifies a uniqueness constraint that no two distinct tuples in any state r of relation R can have the same value for super key.

A. Sub

B. Parent

C. Candidate

D. Super

What is the correct answer?

4

The size of a data item is called its _______, which can be a field of some record or may be a larger unit such as a record.

A. Similarity

B. Granularity

C. Dimensionality

D. Arity

What is the correct answer?

4

The transactions like adding an employee, enrolling a student in a course are examples of _______

A. Logical

B. Physical

C. None

D. Theoretical

What is the correct answer?

4

Precedence graphs help to find a

A. Serializable schedule.

B. Recoverable schedule.

C. Deadlock free schedule.

D. Cascadeless schedule.

What is the correct answer?

4

_____ is a utility to capture a continuous record of server activity and provide auditing capability.

A. SQL server Profile

B. SQL server wizard.

C. SQL server service manager

D. SQL server setup

What is the correct answer?

4

Drop Table cannot be used to drop a table referenced by a ______ constraint.

A. Primary Key

B. Local Key

C. Foreign Key

D. Composite Key

What is the correct answer?

4

The ______ language consists of SQL statements for operating on the data (insert, Modify, Delete) in tables that already exist.

A. Data Manipulation

B. Data Definition

C. Data Control

D. None

What is the correct answer?

4

Which normal form is considered adequate for normal relational database design?

A. 2NF

B. 5NF

C. 4NF

D. 3NF

What is the correct answer?

4

Which of the following is a reason to model data?

A. Understand each user's perspective of data

B. Understand the data itself irrespective of the physical representation

C. Understand the use of data across application areas

D. All of the above