Home
Current Affairs January 2024

What is the correct answer?

4

For using a specific database …………… command is used.

A. use database

B. database name use

C. Both A & B

D. None of them

Correct Answer :

A. use database


Related Questions

What is the correct answer?

4

______is a special type of integrity constraint that relates two relations & maintains consistency across the relations.

A. Domain Integrity Constraints

B. Referential Integrity Constraints

C. Domain Constraints

D. Entity Integrity Constraints

What is the correct answer?

4

Wait-for graph is used for

A. detecting view serializability.

B. detecting conflict serializability.

C. deadlock prevention

D. deadlock detection

What is the correct answer?

4

The _____ category includes storage media that can be operated on directly by the computers central processing unit.

A. Primary storage

B. Secondary Storage

C. All

D. Tertiary Storage

What is the correct answer?

4

HSAM stands for ……….

A. Hierarchic Standard Access Method

B. Hierarchic Sequential Access Method

C. Hierarchic Sequential and Method

D. Hierarchic Standard and Method

What is the correct answer?

4

Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)

A. Create table Employee(EMPNO int, EMPNAME char(10));

B. Create table Employee(EMPNO integer, EMPNAME String(10));

C. Create table Emplo(EMPNO number, EMPNAME string);

D. Create table Emp(EMPNO int, EMPNAME char(10));

What is the correct answer?

4

Which of the following is a reason to model data?

A. Understand each user's perspective of data

B. Understand the data itself irrespective of the physical representation

C. Understand the use of data across application areas

D. All of the above

What is the correct answer?

4

Checkpoints are a part of

A. Recovery measures.

B. Security measures.

C. Concurrency measures.

D. uthorization measures.

What is the correct answer?

4

A ______ module is typically designed so that it will run on a user workstation or personal computer.

A. Software

B. Server

C. Program

D. Client

What is the correct answer?

4

Protection of data from unauthorized Disclosure results in loss of _______

A. Integrity

B. Availability

C. Confidentiality

D. Discretionary Security

What is the correct answer?

4

Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are

A. distinct values

B. cannot have NULL

C. both (A) & (B)

D. same as primary key

What is the correct answer?

4

Dependency preservation is not guaranteed in

A. BCNF

B. 3NF

C. PJNF

D. DKNF

What is the correct answer?

4

Precedence graphs help to find a

A. Serializable schedule.

B. Recoverable schedule.

C. Deadlock free schedule.

D. Cascadeless schedule.

What is the correct answer?

4

Which one is correct statement?
Logical data independence provides following without changing application programs:
(i) Changes in access methods.
(ii) Adding new entities in database
(iii) Splitting an existing record into two or more records
(iv) C

A. (i) and (ii)

B. (iv) only

C. (i) and (iv)

D. (ii) and (iii)

What is the correct answer?

4

In b-tree the number of keys in each node is than the number of its children.

A. one less

B. same

C. one more

D. half

What is the correct answer?

4

Which of the following is not a logical database structure?

A. Chain

B. Network

C. Tree

D. Relational

What is the correct answer?

4

In SQL the statement select * from R, S is equivalent to

A. Select * from R natural join S.

B. Select * from R cross join S.

C. Select * from R union join S.

D. Select * from R inner join S.

What is the correct answer?

4

In E-R Diagram total participation is represented by

A. Double lines

B. Single line

C. Dashed lines

D. Triangle

What is the correct answer?

4

Which two files are used during operation of the DBMS?

A. Query languages and utilities

B. DML and query language

C. Data dictionary and transaction log

D. Data dictionary and query language

What is the correct answer?

4

Tree structures are used to store data in

A. Network model.

B. Relational model.

C. Hierarchical model.

D. File based system.

What is the correct answer?

4

Key to represent relationship between tables is called

A. primary key

B. secondary key

C. foreign key

D. none of the above

What is the correct answer?

4

What is a disjoint less constraint?

A. It requires that an entity belongs to no more than one level entity set.

B. The same entity may belong to more than one level.

C. The database must contain an unmatched foreign key value.

D. An entity can be joined with another entity in the same level entity set.

What is the correct answer?

4

What is data integrity?

A. It is the data contained in database that is non redundant.

B. It is the data contained in database that is accurate and consistent.

C. It is the data contained in database that is secured.

D. It is the data contained in database that is shared.

What is the correct answer?

4

The metadata is created by the

A. DML compiler

B. DML pre-processor

C. DDL interpreter

D. Query interpreter

What is the correct answer?

4

Given the following relation S(SNO,SNAME,CITY) write a query to update the value of CITY to KANPUR for the supplier S1.

A. UPDATE S CITY = KANPUR WHERE SNO=S1

B. UPDATE S SET CITY = KANPUR FOR SNO=S1

C. UPDATE S SET CITY = KANPUR WHERE SNO=S1

D. UPDATE S RENAME CITY = KANPUR WHERE SNO=S1

What is the correct answer?

4

The statement that is executed automatically by the system as a side effect of the modification of the database is

A. backup

B. assertion

C. recovery

D. trigger

What is the correct answer?

4

The clause in SQL that specifies that the query result should be sorted in ascending or descending order based on the values of one or more columns is

A. View

B. Order by

C. Group by

D. Having

What is the correct answer?

4

When an E-R diagram is mapped to tables, the representation is redundant for

A. weak entity sets

B. weak relationship sets

C. strong entity sets

D. strong relationship sets

What is the correct answer?

4

Relations produced from an E-R model will always be

A. First normal form.

B. Second normal form.

C. Third normal form.

D. Fourth normal form.

What is the correct answer?

4

As per equivalence rules for query transformation, selection operation distributes over

A. Union.

B. Set difference.

C. Intersection.

D. All of the above.

What is the correct answer?

4

The size of a data item is called its _______, which can be a field of some record or may be a larger unit such as a record.

A. Similarity

B. Granularity

C. Dimensionality

D. Arity