Home
Current Affairs January 2024

What is the correct answer?

4

Data fragmentation is performed by the …… and each fragment is stored at…………..

A. DBMS, same site

B. OS ,same site

C. DBMS ,different site

D. OS ,different site

Correct Answer :

C. DBMS ,different site


Related Questions

What is the correct answer?

4

What does a field or a combination of fields that has a unique value called ?

A. Foreign key

B. Secondary key

C. Primary key

D. Alternate key

What is the correct answer?

4

Which command is used to cancel privileges granted through the GRANT command ?

A. CANCEL

B. OVER

C. STOP

D. REVOKE

What is the correct answer?

4

Data fragmentation is performed by the …… and each fragment is stored at…………..

A. DBMS, same site

B. OS ,same site

C. DBMS ,different site

D. OS ,different site

What is the correct answer?

4

Which of the following is logical topology?

A. Bus

B. Ring

C. Star

D. None of these

What is the correct answer?

4

What does the number of attributes in a relation is called?

A. Cardinality

B. Degree

C. Tuple

D. Order

What is the correct answer?

4

Functional dependencies are generalization of

A. Relation dependencies

B. Data dependencies

C. key dependencies

D. none of the above

What is the correct answer?

4

Technique used in log based recovery

A. Immediate database modification

B. Graph-based recovery

C. key dependencies

D. none of the above

What is the correct answer?

4

Multivalued dependency is removed in

A. 4 NF

B. 3 NF

C. 2 NF

D. 1 NF

What is the correct answer?

4

Data Manipulation Language DML) is not to

A. Create information table in the Database

B. Insertion of new information into the Database

C. Deletion of information in the Database

D. Modification of information in the Database

What is the correct answer?

4

Only one communication channel is needed rather than n channels to transmit data between two communicating devices

A. parallel

B. serial

C. analog

D. digital

What is the correct answer?

4

The language used in application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. VDL

D. SDL

What is the correct answer?

4

Unwanted energy from source other than the transmitter.

A. Attenuation

B. Distortion

C. Delay

D. Noise

What is the correct answer?

4

The method of access which uses key transformation is known as

A. direct.

B. hash.

C. random.

D. sequential.

What is the correct answer?

4

Size of source and destination address in IP header

A. 4 bits

B. 8 bits

C. 12 bits

D. 32 bits

What is the correct answer?

4

A data dictionary contains:
i) The name of all fields in all files.
ii) The data type of all fields in all files.
iii) The width of all fields in all files.

A. only i)

B. only i) and ii)

C. only ii) and iii)

D. i) ii) iii)

What is the correct answer?

4

Which of the following statements is not true about two tier client server database architecture?

A. SQL statements are processed on tier server

B. SQL statements may be processed on some of the clients

C. Business logic is mostly processed on clients

D. Business logic may be processed on the server

What is the correct answer?

4

Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer

A. i and ii only

B. ii and iii only

C. ii only

D. i only

What is the correct answer?

4

Transaction access data using two operations

A. read(), print()

B. read(), write()

C. scan(), write()

D. none of the above

What is the correct answer?

4

The maximum number of children in a B-tree of order m is

A. m+1

B. m

C. m-1

D. m/2

What is the correct answer?

4

A relation that has no partial dependencies is in which normal form

A. First

B. Second

C. Third

D. BCNF

What is the correct answer?

4

The mode in which data item may be locked

A. Partner

B. Mutual

C. Exclusive

D. Atomic

What is the correct answer?

4

UML is stands for

A. Universal Modeling Language

B. Unified Modeling Language

C. United Modeling Language

D. Uni Modeling Language

What is the correct answer?

4

In mesh topology, if the number of devices is n , then the number of ports present in each device is

A. n

B. n+1

C. n-1

D. n/2

What is the correct answer?

4

Referential integrity

A. controls relationships between operations of an object

B. controls relationships between instances of a class

C. controls relationships between attributes in a table

D. controls relationships between tables in a database

What is the correct answer?

4

If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.

A. Noise

B. Delay

C. Dispersion

D. Attenuation

What is the correct answer?

4

What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only

B. i, ii and iv only

C. ii, iii and iv only

D. i, iii and iv only

What is the correct answer?

4

Expand the acronym OLAP

A. Object Linked Access Program

B. Organizational Architecture Processing

C. Online Analytical Processing

D. none of these

What is the correct answer?

4

Three SQL, DDL, CREATE commands are

A. Schema, Base and Table

B. Schema, Table and View

C. Base, Table and Schema

D. Key, Base and Table

What is the correct answer?

4

Which of the following produces the relation that has attributes of R1 and R2

A. Cartesian product

B. Difference

C. Intersection

D. Product

What is the correct answer?

4

The exists construct returns the value true, if the argument subquery is

A. empty

B. nonempty

C. contains null values

D. none of the above