Home
Current Affairs January 2024

What is the correct answer?

4

Change Staff table by removing default of Assistant for position column

A. ALTER TABLE Staff ALTER position DROP DEFAULT;

B. ALTER TABLE Staff ALTER position DEFAULT;

C. ALTER TABLE Staff ALTER DROP DEFAULT;

D. MODIFY Staff ALTER position DROP DEFAULT;

Correct Answer :

A. ALTER TABLE Staff ALTER position DROP DEFAULT;


Related Questions

What is the correct answer?

4

A list consists of last names, first names, addresses and pin codes. If all people in the list have the same last name and same pin code a useful key would be

A. the pin code

B. the last name

C. the compound key first name and last name

D. Tr from next page

What is the correct answer?

4

The ______ indexes are forced to store only record IDs in the data structure and require at least one additional I/O Operation to retrieve the actual record.

A. Clustered

B. Hashed

C. Un-clustered

D. Collision

What is the correct answer?

4

____ table store information about database or about the system.

A. SQL

B. System

C. Nested

D. None of these

What is the correct answer?

4

A logical schema

A. is the entire database

B. Describes how data is actually stored on disk.

C. is a standard way of organizing information into accessible parts.

D. All of the above

What is the correct answer?

4

Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)

A. Create table Employee(EMPNO int, EMPNAME char(10));

B. Create table Employee(EMPNO integer, EMPNAME String(10));

C. Create table Emplo(EMPNO number, EMPNAME string);

D. Create table Emp(EMPNO int, EMPNAME char(10));

What is the correct answer?

4

A weak entity has an ______ dependency on its owner entity, which can be used for both ON UPDATE and ON DELETE.

A. Direct

B. Indirect

C. Existence

D. No

What is the correct answer?

4

Which of the following is not a consequence of concurrent operations?

A. Lost update problem.

B. Update anomaly.

C. Unrepeatable read.

D. Dirty read.

What is the correct answer?

4

Which of the following ensures the atomicity of the transaction?

A. Transaction management component of DBMS

B. Application Programmer

C. Concurrency control component of DBMS

D. Recovery management component of DBMS

What is the correct answer?

4

____specifies a search condition for a group or an aggregate.

A. GROUP BY Clause

B. HAVING Clause

C. FROM Clause

D. WHERE Clause

What is the correct answer?

4

Change Staff table by removing default of Assistant for position column

A. ALTER TABLE Staff ALTER position DROP DEFAULT;

B. ALTER TABLE Staff ALTER position DEFAULT;

C. ALTER TABLE Staff ALTER DROP DEFAULT;

D. MODIFY Staff ALTER position DROP DEFAULT;

What is the correct answer?

4

The cost of reading and writing temporary files while evaluating a query can be reduced by

A. building indices

B. pipelining

C. join ordering

D. none of the above

What is the correct answer?

4

Relational Algebra does not have

A. Selection operator.

B. Projection operator.

C. Aggregation operators.

D. Division operator.

What is the correct answer?

4

The middleware databases in which the business rules act are applicable to _______ tier architectures

A. Single

B. Three

C. Two

D. None

What is the correct answer?

4

______contains information that defines valid values that are stored in a column or data type.

A. Default

B. Index

C. Rule

D. View

What is the correct answer?

4

The ____ operator joins two or more conditions and displays rows only if that rows data satisfies all conditions specified.

A. OR

B. AND

C. NOT

D. ALL

What is the correct answer?

4

The clause alter table in SQL can be used to

A. add an attribute

B. delete an attribute

C. alter the default values of an attribute

D. all of the above

What is the correct answer?

4

Key to represent relationship between tables is called

A. primary key

B. secondary key

C. foreign key

D. none of the above

What is the correct answer?

4

Which of the following constitutes a basic set of operations for manipulating relational data?

A. Predicate calculus

B. Relational calculus

C. Relational algebra

D. SQL

What is the correct answer?

4

_____ command can be used to modify a column in a table

A. alter

B. update

C. set

D. create

What is the correct answer?

4

A table can have only one

A. Secondary key

B. Alternate key

C. Unique key

D. Primary key

What is the correct answer?

4

If both the functional dependencies : X�Y and Y�X hold for two attributes X and Y then the relationship between X and Y is

A. M:N

B. M:1

D. 1:M

What is the correct answer?

4

The full form of GUI is _________

A. Government Union Internet

B. Graphical Unit Interface

C. Graphical User Interface

D. Graphical University Interface

What is the correct answer?

4

Relationships among relationships can be represented in an-E-R model using

A. Aggregation

B. Association

C. Weak entity sets

D. Weak relationship sets

What is the correct answer?

4

DFD stands for

A. Data Flow Document

B. Data File Diagram

C. Data Flow Diagram

D. Non of the above

What is the correct answer?

4

The metadata is created by the

A. DML compiler

B. DML pre-processor

C. DDL interpreter

D. Query interpreter

What is the correct answer?

4

In b-tree the number of keys in each node is than the number of its children.

A. one less

B. same

C. one more

D. half

What is the correct answer?

4

The collection of information stored in a database at a particular moment is called as ......

A. schema

B. instance of the database

C. data domain

D. independence

What is the correct answer?

4

Which one is true statement :

A. With finer degree of granularity of locking a high degree of concurrency is possible.

B. Locking prevents non-serializable schedules.

C. Locking cannot take place at field level.

D. An exclusive lock on data item X is granted even if a shared lock is already held on X.

What is the correct answer?

4

Protection of data from unauthorized Disclosure results in loss of _______

A. Integrity

B. Availability

C. Confidentiality

D. Discretionary Security

What is the correct answer?

4

………………… approach reduces time and effort required for design and lesser risk in database management.

A. Single global database

B. Multiple databases

C. Top-down approach

D. None of the above