Home
Current Affairs January 2024

What is the correct answer?

4

Data independence means

A. data is defined separately and not included in programs.

B. programs are not dependent on the physical attributes of data.

C. programs are not dependent on the logical attributes of data.

D. both B) and C).

Correct Answer :


Related Questions

What is the correct answer?

4

Data fragmentation is performed by the …… and each fragment is stored at…………..

A. DBMS, same site

B. OS ,same site

C. DBMS ,different site

D. OS ,different site

What is the correct answer?

4

In which of the following SET concept is used ?

A. Network Model

B. Hierarchical Model

C. Relational Model

D. None of these

What is the correct answer?

4

A relation which is in 3NF is

A. in 1NF also

B. in 2NF also

C. free from transitive dependencies

D. All of these

What is the correct answer?

4

In RDBMS, Data is presented as a collection of

A. Relation

B. Table

C. Attribute

D. Entity

What is the correct answer?

4

The control of concurrent execution is left with the

A. operating system

B. controller unit of the kernel

C. concurrency control component of the database system

D. none

What is the correct answer?

4

If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.

A. Noise

B. Delay

C. Dispersion

D. Attenuation

What is the correct answer?

4

DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions

A. Backup

B. Recovery

C. Grant

D. Troubleshooting

What is the correct answer?

4

In ………… paging we make copy of the current page table.

A. physical

B. logical

C. shadow

D. duplicate

What is the correct answer?

4

Which of the following is logical topology?

A. Bus

B. Ring

C. Star

D. None of these

What is the correct answer?

4

The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

A. entity integrity rule

B. referential integrity constraint

C. composite attribute

D. action assertion

What is the correct answer?

4

The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only

B. ii and iv only

C. ii and iv only

D. i, iv only

What is the correct answer?

4

A table that displays data redundancies yields ____________ anomalies

A. Insertion

B. Deletion

C. Update

D. All of the above

What is the correct answer?

4

Data integrity refers to

A. the uniqueness of the data in a database

B. the correctness and completeness of the data in a database

C. the un redundancies of the data in a database

D. Data independence of the database

What is the correct answer?

4

In client/server computing data are

A. sent only upon the client's request

B. sent in complete copies for the client to filter and sort

C. never sent to the client machine

D. sent in very large sections to save processing time

What is the correct answer?

4

Which one of the following is provided by a data dictionary ?

A. User data

B. Database structure data

C. Sorted data

D. Functional data

What is the correct answer?

4

Which of the following is a classical approach to database design?

A. Left Right approach

B. Right Left approach

C. Top Down approach

D. Bottom Up approach

What is the correct answer?

4

Query processing is

A. converting data to insert in a database

B. translation of query to lower form

C. range of activities involved in extracting data from a database

D. none of the above

What is the correct answer?

4

What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only

B. i, ii and iv only

C. ii, iii and iv only

D. i, iii and iv only

What is the correct answer?

4

Triggers are also called

A. active rules

B. passive rules

C. inferences

D. none of the above

What is the correct answer?

4

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. Field-level lock

B. Row-level lock

C. Table-level lock

D. Database-level lock

What is the correct answer?

4

Which of the following produces the relation that has attributes of R1 and R2

A. Cartesian product

B. Difference

C. Intersection

D. Product

What is the correct answer?

4

Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?

A. BCNF

B. Second

C. Third

D. Fourth

What is the correct answer?

4

A logical description of some portion of database that is required by a user to perform task is called as

A. System View

B. User View

C. Logical View

D. Data View

What is the correct answer?

4

Which of the following is not a constraint on a single relation?

A. check

B. unique

C. not null

D. is duplicate

What is the correct answer?

4

Noiseless channel has ……… types of protocols.

A. 2

B. 3

C. 4

D. 5

What is the correct answer?

4

A …………… is a memory area where data are processed.

A. view

B. trigger

C. cursor

D. none of the above

What is the correct answer?

4

The collection of information stored in a database at a particular moment is?

A. View

B. Instance

C. Scheme

D. None of these

What is the correct answer?

4

The statement in SQL which allows to change the definition of a table is

A. Select

B. Update

C. Create

D. Alter

What is the correct answer?

4

Which of the following is not proper state of transaction ?

A. Partially aborted

B. Partially committed

C. Aborted

D. Committed

What is the correct answer?

4

RAID

A. Redundant Arrays of Independent Disks

B. Redundant Arrays of Independent Drives

C. Redundant Arrays of Interconnected Drives

D. Redundant Arrays of Interconnected Disks