Home
Current Affairs January 2024

What is the correct answer?

4

In two-phase locking

A. the data items are locked in growing phase.

B. the data items are released in shrinking phase.

C. Both A and B are true

D. Both A and B are false

Correct Answer :

C. Both A and B are true


Related Questions

What is the correct answer?

4

Electromagnetic spectrum included in radiowaves are
i) Super High Frequency (SHF)
ii) Very High Frequency (VHF)
iii) Ultra High Frequency (UHF)
iv) High Frequencies (HF)

A. i, ii and iii only

B. i, ii and iv only

C. ii, iii and iv only

D. i, iii and iv only

What is the correct answer?

4

The syntax to select all column from the table is

A. select all from tablename

B. select * from tablename

C. select from tablename

D. none of these

What is the correct answer?

4

An association of several structure of a data base can be expressed graphically by?

A. Tuple

B. Record

C. Relationship

D. Field

What is the correct answer?

4

Three SQL, DDL, CREATE commands are

A. Schema, Base and Table

B. Schema, Table and View

C. Base, Table and Schema

D. Key, Base and Table

What is the correct answer?

4

A relation that has no partial dependencies is in which normal form

A. First

B. Second

C. Third

D. BCNF

What is the correct answer?

4

An advantage of the database management approach is

A. data is dependent on programs.

B. data redundancy increases.

C. data is integrated and can be accessed by multiple programs.

D. none of the above.

What is the correct answer?

4

Which of the following submit and execute query at run time?

A. Static SQL

B. Dynamic SQL

C. both

D. none of these

What is the correct answer?

4

What is ACID properties of Transactions?

A. Atomicity, Consistency, Isolation, Database

B. Atomicity, Consistency, Isolation, Durability

C. Atomicity, Consistency, Inconsistent, Durability

D. Automatically, Concurrency, Isolation, Durability

What is the correct answer?

4

The number of cursors depend on the

A. number of queries

B. number of attributes

C. size of memory area

D. none of these

What is the correct answer?

4

By default a user who has been granted some form of authorization

A. is allowed to pass them to others

B. is not allowed to pass them to others

C. may be or may not be allowed to pass them to others

D. none

What is the correct answer?

4

In RDBMS, Data is presented as a collection of

A. Relation

B. Table

C. Attribute

D. Entity

What is the correct answer?

4

Which command is used to cancel privileges granted through the GRANT command ?

A. CANCEL

B. OVER

C. STOP

D. REVOKE

What is the correct answer?

4

A logical schema

A. is the entire database.

B. is a standard way of organizing information into accessible parts.

C. describes how data is actually stored on disk.

D. both A) and C)

What is the correct answer?

4

Symbol to represent weak entity set in ER Model

A. Dotted rectangle

B. Square

C. Doubly outlined rectangle

D. Diamond

What is the correct answer?

4

A functional dependency between two or more non-key attributes is called

A. Transitive dependency

B. Partial transitive dependency

C. Functional dependency

D. Partial functional dependency

What is the correct answer?

4

Which one of the following is provided by a data dictionary ?

A. User data

B. Database structure data

C. Sorted data

D. Functional data

What is the correct answer?

4

The transaction consists of all statements executed between

A. the begin transaction and end transaction

B. the start transaction and end transaction

C. the begin transaction and finish transaction

D. none of the above.

What is the correct answer?

4

Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?

A. BCNF

B. Second

C. Third

D. Fourth

What is the correct answer?

4

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. Field-level lock

B. Row-level lock

C. Table-level lock

D. Database-level lock

What is the correct answer?

4

The maximum number of children in a B-tree of order m is

A. m+1

B. m

C. m-1

D. m/2

What is the correct answer?

4

In a Hierarchical model records are organized as

A. Graph.

B. List.

C. Links.

D. Tree.

What is the correct answer?

4

A …………… is a memory area where data are processed.

A. view

B. trigger

C. cursor

D. none of the above

What is the correct answer?

4

Size of source and destination address in IP header

A. 4 bits

B. 8 bits

C. 12 bits

D. 32 bits

What is the correct answer?

4

The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

A. entity integrity rule

B. referential integrity constraint

C. composite attribute

D. action assertion

What is the correct answer?

4

Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only

B. ii, only

C. ii, iii only

D. none of the above

What is the correct answer?

4

Aggregate functions are also called

A. serial functions

B. non-serial functions

C. row functions

D. column functions

What is the correct answer?

4

The command used to delete a particular column in a relation

A. UPDATE

B. DROP

C. ALTER

D. DELETE

What is the correct answer?

4

A type of query that is placed within a WHERE or HAVING clause of another query is called

A. Super query

B. Sub query

C. Master query

D. Multi-query

What is the correct answer?

4

Data fragmentation is performed by the …… and each fragment is stored at…………..

A. DBMS, same site

B. OS ,same site

C. DBMS ,different site

D. OS ,different site

What is the correct answer?

4

In mesh topology, if the number of devices is n , then the number of ports present in each device is

A. n

B. n+1

C. n-1

D. n/2