Related Questions
What is the correct answer?
4
A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit
What is the correct answer?
4
Select the incorrect statement
A. BCNF is stronger than 3NF
B. Relational algebra is a non-procedural language
C. Every conflict serializable schedule is view serializable.
What is the correct answer?
4
The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is
C. Enforcing referential integrity
D. Enforcing data integrity
What is the correct answer?
4
A relation that has no partial dependencies is in which normal form
What is the correct answer?
4
Range variables are designed using the
What is the correct answer?
4
Generalization is a
What is the correct answer?
4
DBMS helps achieve
B. Centralized control of data
What is the correct answer?
4
Unwanted energy from source other than the transmitter.
What is the correct answer?
4
A composite attribute is converted to individual attributes in which of the following normal form ?
What is the correct answer?
4
The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :
What is the correct answer?
4
UML is stands for
A. Universal Modeling Language
B. Unified Modeling Language
C. United Modeling Language
What is the correct answer?
4
Size of source and destination address in IP header
What is the correct answer?
4
An association of several structure of a data base can be expressed graphically by?
What is the correct answer?
4
.................. occurs due to velocity of propagation the frequency varies. Thus various frequency components of a signal arrive at the receiver at different times.
C. Attenuation distortion
What is the correct answer?
4
Natural mask for a Class A network
What is the correct answer?
4
Which of the following produces the relation that has attributes of R1 and R2
What is the correct answer?
4
The ability to modify the conceptual schema without causing any change to the application program is known as
A. Physical data independence
B. Logical data independence
C. External data independence
What is the correct answer?
4
Noisy channel has ……… .. types of protocols
What is the correct answer?
4
Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions
What is the correct answer?
4
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
then the maximum size of join is:
What is the correct answer?
4
The left outer join takes all tuples
A. in the left relation which didnt match with any tuple in right relation
B. in the left relation which matched with a tuple in right relation
C. in the right relation which didnt match with any tuple in left relation
D. in the right relation which matched with a tuple in left relation
What is the correct answer?
4
The minimal set of super key is called
What is the correct answer?
4
Every Boyce-Codd normal form is in
What is the correct answer?
4
Which of the following statement returns data to the host variables one at a time?
What is the correct answer?
4
The maximum number of children in a B-tree of order m is
What is the correct answer?
4
If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.
What is the correct answer?
4
Cross Product is a:
What is the correct answer?
4
What does a field or a combination of fields that has a unique value called ?
What is the correct answer?
4
The method of access which uses key transformation is known as
What is the correct answer?
4
Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization