Home
Current Affairs January 2024

What is the correct answer?

4

Encoding method which does not provide for synchronization

A. B8ZS

B. Manchester

C. RZ

D. NRZ-L

Correct Answer :

D. NRZ-L


Related Questions

What is the correct answer?

4

Functional dependencies are generalization of

A. Relation dependencies

B. Data dependencies

C. key dependencies

D. none of the above

What is the correct answer?

4

Which command is used to cancel privileges granted through the GRANT command ?

A. CANCEL

B. OVER

C. STOP

D. REVOKE

What is the correct answer?

4

Log into a computer across an internet

A. IMAP

B. TELNET

C. POP3

D. Infrared

What is the correct answer?

4

Multivalued dependency is removed in

A. 4 NF

B. 3 NF

C. 2 NF

D. 1 NF

What is the correct answer?

4

Noiseless channel has ……… types of protocols.

A. 2

B. 3

C. 4

D. 5

What is the correct answer?

4

Data fragmentation is performed by the …… and each fragment is stored at…………..

A. DBMS, same site

B. OS ,same site

C. DBMS ,different site

D. OS ,different site

What is the correct answer?

4

An entity set which have sufficient attributes to form a primary key

A. Tree structure

B. Subtree structure

C. Strong entity set

D. Table structure

What is the correct answer?

4

Benefit of database normalization is

A. smaller number of tables

B. higher query processing efficiency

C. reduced I/O for most queries

D. reduced data redundancy

What is the correct answer?

4

If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.

A. Noise

B. Delay

C. Dispersion

D. Attenuation

What is the correct answer?

4

Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only

B. ii only

C. Both

D. None of these

What is the correct answer?

4

In two-phase locking

A. the data items are locked in growing phase.

B. the data items are released in shrinking phase.

C. Both A and B are true

D. Both A and B are false

What is the correct answer?

4

A data manipulation command the combines the records from one or more tables is called

A. SELECT

B. PROJECT

C. JOIN

D. PRODUCT

What is the correct answer?

4

EEPROM

A. Electrically Extractable Programmable Read Only Memory

B. Electrically Erasable Programmable Read Only Memory

C. Electronically Erasable Programmable Read Only Memory

D. Electrically Erasable Programmable Read Only Memory

What is the correct answer?

4

Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only

B. ii, only

C. ii, iii only

D. none of the above

What is the correct answer?

4

Datalog is

A. procedural query language

B. nonprocedural query language

C. scan(), write()

D. none of the above

What is the correct answer?

4

A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only

B. ii and iii only

C. i and iii only

D. iii and iv only

What is the correct answer?

4

Generalization is a

A. top-down approach.

B. bottom-up approach.

C. left-right approach.

D. none of the above

What is the correct answer?

4

B-Tree is used for

A. searching data

B. storing data

C. both A and B

D. none of these

What is the correct answer?

4

Tape storage is referred to as

A. sequential access storage

B. direct access storage

C. random access storage

D. none of the above

What is the correct answer?

4

The method of access which uses key transformation is known as

A. direct.

B. hash.

C. random.

D. sequential.

What is the correct answer?

4

Three SQL, DDL, CREATE commands are

A. Schema, Base and Table

B. Schema, Table and View

C. Base, Table and Schema

D. Key, Base and Table

What is the correct answer?

4

In client/server computing data are

A. sent only upon the client's request

B. sent in complete copies for the client to filter and sort

C. never sent to the client machine

D. sent in very large sections to save processing time

What is the correct answer?

4

The language used in application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. VDL

D. SDL

What is the correct answer?

4

In two-phase locking protocol the two phases are

A. growing phase and shrinking phase

B. execution phase and blocking phase.

C. running phase and sleeping phase.

D. none of the above

What is the correct answer?

4

In a Hierarchical model records are organized as

A. Graph.

B. List.

C. Links.

D. Tree.

What is the correct answer?

4

It is possible to define a schema completely using

A. VDL and DDL.

B. DDL and DML.

C. SDL and DDL.

D. VDL and DML.

What is the correct answer?

4

In case of entity integrity, the primary key may be

A. not Null

B. Null

C. both Null & not Null.

D. any value.

What is the correct answer?

4

A transaction is said to have terminated if it has

A. either committed or aborted

B. either partially committed or aborted

C. either committed or failed

D. none of these

What is the correct answer?

4

The overall design of a database is called

A. Subschema of the database

B. Schema of the database

C. Structure of the database

D. View of the database

What is the correct answer?

4

Which of the following statement returns data to the host variables one at a time?

A. SELECT

B. RETURN

C. FETCH

D. GET