Home
Current Affairs January 2024

What is the correct answer?

4

Grant and revoke are _____ statements.

A. TCL

B. DCL

C. DDL

D. DML

Correct Answer :

B. DCL


Related Questions

What is the correct answer?

4

The middleware databases in which the business rules act are applicable to _______ tier architectures

A. Single

B. Three

C. Two

D. None

What is the correct answer?

4

____specifies a search condition for a group or an aggregate.

A. GROUP BY Clause

B. HAVING Clause

C. FROM Clause

D. WHERE Clause

What is the correct answer?

4

Which of the following is not a consequence of concurrent operations?

A. Lost update problem.

B. Update anomaly.

C. Unrepeatable read.

D. Dirty read.

What is the correct answer?

4

A table can have only one

A. Secondary key

B. Alternate key

C. Unique key

D. Primary key

What is the correct answer?

4

Maximum height of a B+ tree of order m with n key values is

A. Logm(n)

B. (m+n)/2

C. Logm/2(m+n)

D. None of these

What is the correct answer?

4

Create a table with the following attributes: Employee(EMPNO integer, EMPNAME of 10 characters)

A. Create table Employee(EMPNO int, EMPNAME char(10));

B. Create table Employee(EMPNO integer, EMPNAME String(10));

C. Create table Emplo(EMPNO number, EMPNAME string);

D. Create table Emp(EMPNO int, EMPNAME char(10));

What is the correct answer?

4

______is a preferred method for enforcing data integrity

A. Constraints

B. Triggers

C. Stored procedure

D. Cursors

What is the correct answer?

4

Which of the following is not a logical database structure?

A. Chain

B. Network

C. Tree

D. Relational

What is the correct answer?

4

For correct behaviour during recovery, undo and redo operation must be

A. Commutative

B. Associative

C. idempotent

D. distributive

What is the correct answer?

4

_____ database is used to provide statistical information or summaries of values based on various criteria.

A. Statistical

B. Mathematical

C. Normalized

D. Un normalized

What is the correct answer?

4

_____clause is an additional filter that is applied to the result.

A. Select

B. Order by

C. Group-by

D. Having

What is the correct answer?

4

A DBMS is a ____ user if at most one user can use the system and is mostly restricted to personal computer systems.

A. None

B. Multi

C. Single

D. Concurrent

What is the correct answer?

4

An advantage of the database management approach is

A. data redundancy increases

B. data is dependent on programs

C. data is integrated and can be accessed by multiple programs

D. none of the above

What is the correct answer?

4

The size of a data item is called its _______, which can be a field of some record or may be a larger unit such as a record.

A. Similarity

B. Granularity

C. Dimensionality

D. Arity

What is the correct answer?

4

Which one is true statement :

A. With finer degree of granularity of locking a high degree of concurrency is possible.

B. Locking prevents non-serializable schedules.

C. Locking cannot take place at field level.

D. An exclusive lock on data item X is granted even if a shared lock is already held on X.

What is the correct answer?

4

Grant and revoke are _____ statements.

A. TCL

B. DCL

C. DDL

D. DML

What is the correct answer?

4

______is a special type of integrity constraint that relates two relations & maintains consistency across the relations.

A. Domain Integrity Constraints

B. Referential Integrity Constraints

C. Domain Constraints

D. Entity Integrity Constraints

What is the correct answer?

4

DROP is a statement in SQL.

A. Query

B. Embedded SQL

C. DDL

D. DCL

What is the correct answer?

4

Which of the following addressing modes permits relocation without any change over in the code?

A. Indirect addressing

B. Indexed addressing

C. PC relative addressing

D. Base register addressing

What is the correct answer?

4

In an E-R diagram double lines indicate

A. Total participation.

B. Multiple participation.

C. Cardinality N.

D. None of the above.

What is the correct answer?

4

The rule that a value of a foreign key must appear as a value of some specific table is called a

A. Referential constraint.

B. Index.

C. Integrity constraint.

D. Functional dependency.

What is the correct answer?

4

The clause alter table in SQL can be used to

A. add an attribute

B. delete an attribute

C. alter the default values of an attribute

D. all of the above

What is the correct answer?

4

Whenever two independent one-to-many relationships are mixed in the same relation, a __________ arises.

A. Functional dependency

B. Multi-valued dependency

C. Transitive dependency

D. Partial dependency

What is the correct answer?

4

Which of the following is not a property of transactions?

A. Atomicity

B. Concurrency

C. Isolation

D. Durability

What is the correct answer?

4

The common column is eliminated in

A. theta join

B. outer join

C. natural join

D. composed join

What is the correct answer?

4

In multiple granularity of locks SIX lock is compatible with

A. IX

B. IS

C. S

D. SIX

What is the correct answer?

4

_____ command can be used to modify a column in a table

A. alter

B. update

C. set

D. create

What is the correct answer?

4

____ table store information about database or about the system.

A. SQL

B. System

C. Nested

D. None of these

What is the correct answer?

4

Protection of data from unauthorized Disclosure results in loss of _______

A. Integrity

B. Availability

C. Confidentiality

D. Discretionary Security

What is the correct answer?

4

An advantage of views is

A. Data security

B. Derived columns

C. Hiding of complex queries

D. All of the above