Home
Current Affairs January 2024

What is the correct answer?

4

In client/server computing data are

A. sent only upon the client's request

B. sent in complete copies for the client to filter and sort

C. never sent to the client machine

D. sent in very large sections to save processing time

Correct Answer :

A. sent only upon the client's request


Related Questions

What is the correct answer?

4

The output of the Data Definition Language is stored in the

A. view table

B. schema

C. metadata

D. all of the above.

What is the correct answer?

4

The control of concurrent execution is left with the

A. operating system

B. controller unit of the kernel

C. concurrency control component of the database system

D. none

What is the correct answer?

4

Which of the following is also known as Offline storage ?

A. primary storage

B. secondary storage

C. tertiary storage

D. none of the above

What is the correct answer?

4

For large networks, _______ topology is used

A. Ring

B. Bus

C. Mesh

D. none of these

What is the correct answer?

4

Which one of the following statements is false?

A. The data dictionary is normally maintained by the database administrator.

B. Data elements in the database can be modified by changing the data dictionary.

C. The data dictionary contains the name and description of each data element.

D. The data dictionary is a tool used exclusively by the database administrator.

What is the correct answer?

4

Functional dependencies are generalization of

A. Relation dependencies

B. Data dependencies

C. key dependencies

D. none of the above

What is the correct answer?

4

Data integrity refers to

A. the uniqueness of the data in a database

B. the correctness and completeness of the data in a database

C. the un redundancies of the data in a database

D. Data independence of the database

What is the correct answer?

4

Thermal noise is often referred to as ............... noise, because it affects uniformly the different frequencies.

A. Gray

B. White

C. Blue

D. Black

What is the correct answer?

4

Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions

A. i only

B. ii only

C. Both A and B

D. None of the above

What is the correct answer?

4

Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only

B. ii only

C. Both

D. None of these

What is the correct answer?

4

The syntax to select all column from the table is

A. select all from tablename

B. select * from tablename

C. select from tablename

D. none of these

What is the correct answer?

4

Natural mask for a Class A network

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. none of these

What is the correct answer?

4

What is ACID properties of Transactions?

A. Atomicity, Consistency, Isolation, Database

B. Atomicity, Consistency, Isolation, Durability

C. Atomicity, Consistency, Inconsistent, Durability

D. Automatically, Concurrency, Isolation, Durability

What is the correct answer?

4

If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.

A. Noise

B. Delay

C. Dispersion

D. Attenuation

What is the correct answer?

4

Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only

B. ii, only

C. ii, iii only

D. none of the above

What is the correct answer?

4

.................. is the loss of energy as the signal propagates outward, where the amount of energy depends on the frequency.

A. Noise

B. Delay distortion

C. Attenuation distortion

D. Dispersion

What is the correct answer?

4

Disk storage is referred to as

A. sequential access storage

B. direct access storage

C. random access storage

D. none of the above

What is the correct answer?

4

Technique(s) used for data recovery after any failure

A. Logging

B. Recovery manager

C. Both A and B are true

D. Both A and B are false

What is the correct answer?

4

Only one communication channel is needed rather than n channels to transmit data between two communicating devices

A. parallel

B. serial

C. analog

D. digital

What is the correct answer?

4

Database locking concept is used to solve the problem of

A. Lost Update

B. Uncommitted Dependency

C. Inconsistent Data

D. All of the above

What is the correct answer?

4

Volatile storage

A. loses its contents when power is switched off.

B. doesnt loses its contents when power is switched off.

C. creates backup when power is switched off.

D. none

What is the correct answer?

4

In E-R diagram Generalization is represented by

A. Circle

B. Rectangle

C. Hyperbola

D. Triangle

What is the correct answer?

4

In this data model each record can hae more than one parent

A. Hierarchical model

B. E-R model

C. Network based model

D. none of these

What is the correct answer?

4

File organization that provides fast access to any arbitrary record

A. Hashed file

B. B-tree

C. Ordered file

D. Unordered file

What is the correct answer?

4

In which of the following transmissions, we can send data by grouping n bits at a time instead of a single bit?

A. parallel

B. serial

C. analog

D. digital

What is the correct answer?

4

A subschema expresses

A. the logical view.

B. the physical view.

C. the external view.

D. all of the above.

What is the correct answer?

4

A transaction which completes successfully is called

A. Granted

B. Committed

C. Compensated

D. Accomplished

What is the correct answer?

4

Which command is used to cancel privileges granted through the GRANT command ?

A. CANCEL

B. OVER

C. STOP

D. REVOKE

What is the correct answer?

4

Which of the following submit and execute query at run time?

A. Static SQL

B. Dynamic SQL

C. both

D. none of these

What is the correct answer?

4

The method of access which uses key transformation is known as

A. direct.

B. hash.

C. random.

D. sequential.