Related Questions
What is the correct answer?
4
Which of the following Key is used to represent relationship between the tables?
What is the correct answer?
4
Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel
What is the correct answer?
4
In case of entity integrity, the primary key may be
What is the correct answer?
4
Attenuation can be also expressed in decibel dB) and commonly used because.
i) Signal strengths often fall off logarithmically
ii) Cascade losses and gains can be calculated with simple additions and subtractions
What is the correct answer?
4
Cross Product is a:
What is the correct answer?
4
If the .................... is too much, the receiver may not be able to detect the signal at all or the signal may fall below the noise level.
What is the correct answer?
4
The attribute that can be divided into other attributes is called
C. Multi-valued Attribute
What is the correct answer?
4
Which of the following operator preserves unmatched rows of the relations being joined?
What is the correct answer?
4
The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol
What is the correct answer?
4
DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions
What is the correct answer?
4
A logical description of some portion of database that is required by a user to perform task is called as
What is the correct answer?
4
Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?
What is the correct answer?
4
The minimal set of super key is called
What is the correct answer?
4
Which one of the following is provided by a data dictionary ?
B. Database structure data
What is the correct answer?
4
Triggers are also called
What is the correct answer?
4
Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization
What is the correct answer?
4
.................. means sending a digital signal over a channel without changing the digital signal to an analog signal.
B. Broadband transmission
What is the correct answer?
4
The privilege lists include
i) select
ii) insert
iii) update
iv) delete
What is the correct answer?
4
Three SQL, DDL, CREATE commands are
A. Schema, Base and Table
B. Schema, Table and View
C. Base, Table and Schema
What is the correct answer?
4
Select the incorrect statement
A. View is derived from other tables.
B. Once a transaction has executed commit work its effect cant be undone by rollback work .
C. The input to the aggregate function avg can be non numeric data types
D. A primary key can never be null.
What is the correct answer?
4
Which command is used to cancel privileges granted through the GRANT command ?
What is the correct answer?
4
In defining the notion of the tuple variable, which one of the clause is useful?
What is the correct answer?
4
Electromagnetic spectrum included in radiowaves are
i) Super High Frequency (SHF)
ii) Very High Frequency (VHF)
iii) Ultra High Frequency (UHF)
iv) High Frequencies (HF)
What is the correct answer?
4
Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer
What is the correct answer?
4
Symbol to represent weak entity set in ER Model
C. Doubly outlined rectangle
What is the correct answer?
4
The overall design of a database is called
A. Subschema of the database
B. Schema of the database
C. Structure of the database
What is the correct answer?
4
Authorization command in SQL
What is the correct answer?
4
The left outer join takes all tuples
A. in the left relation which didnt match with any tuple in right relation
B. in the left relation which matched with a tuple in right relation
C. in the right relation which didnt match with any tuple in left relation
D. in the right relation which matched with a tuple in left relation
What is the correct answer?
4
Which of the following works as a filter?
What is the correct answer?
4
For large networks, _______ topology is used