Home
Current Affairs January 2024

What is the correct answer?

4

_______ product was acquired by Informix, integrated into its RDBMS and introduced as the Informix Universal Server an ORDBMS.

A. Star

B. llustar

C. SQL

D. Cygnus

Correct Answer :

B. llustar


Related Questions

What is the correct answer?

4

The clause in SQL that specifies that the query result should be sorted in ascending or descending order based on the values of one or more columns is

A. View

B. Order by

C. Group by

D. Having

What is the correct answer?

4

Whenever two independent one-to-many relationships are mixed in the same relation, a __________ arises.

A. Functional dependency

B. Multi-valued dependency

C. Transitive dependency

D. Partial dependency

What is the correct answer?

4

Which of the syntax is correct for insert statement?
i) insert into values
ii) insert into (column list) values

A. i-only

B. ii-only

C. Both of them

D. None of them

What is the correct answer?

4

A table can have only one

A. Secondary key

B. Alternate key

C. Unique key

D. Primary key

What is the correct answer?

4

____specifies a search condition for a group or an aggregate.

A. GROUP BY Clause

B. HAVING Clause

C. FROM Clause

D. WHERE Clause

What is the correct answer?

4

______is a preferred method for enforcing data integrity

A. Constraints

B. Triggers

C. Stored procedure

D. Cursors

What is the correct answer?

4

The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces a result of degree

A. m - 1

B. m + 1

C. m * m

D. m

What is the correct answer?

4

A top-to-bottom relationship among the items in a database is established by a

A. Hierarchical schema

B. Network schema

C. Relational Schema

D. All of the above

What is the correct answer?

4

______defines the structure of a relation which consists of a fixed set of attribute-domain pairs.

A. Instance

B. Program

C. Schema

D. Super Key

What is the correct answer?

4

Between DRAM and magnetic disk storage another form of memory, called ______ memory is becoming common because it is non volatile.

A. RAM

B. Flash

C. Hard Disk

D. Secondary

What is the correct answer?

4

The size of a data item is called its _______, which can be a field of some record or may be a larger unit such as a record.

A. Similarity

B. Granularity

C. Dimensionality

D. Arity

What is the correct answer?

4

Protection of data from unauthorized Disclosure results in loss of _______

A. Integrity

B. Availability

C. Confidentiality

D. Discretionary Security

What is the correct answer?

4

The one guideline to be followed while designing the database is

A. A database design may be ambiguous.

B. It should avoid/reduce the redundancy.

C. Unrelated data should be in the same table so that updating the data will be easy.

D. An entity should not have attributes.

What is the correct answer?

4

The part of a database management system which ensures that the data remains in a consistent state is

A. authorization and integrity manager

B. buffer manager

C. transaction manager

D. file manager

What is the correct answer?

4

The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is

A. Procedural DML.

B. Non-Procedural DML.

C. Procedural DDL.

D. Non-Procedural DDL.

What is the correct answer?

4

In E-R Diagram total participation is represented by

A. Double lines

B. Single line

C. Dashed lines

D. Triangle

What is the correct answer?

4

Dependency preservation is not guaranteed in

A. BCNF

B. 3NF

C. PJNF

D. DKNF

What is the correct answer?

4

In an E-R diagram double lines indicate

A. Total participation.

B. Multiple participation.

C. Cardinality N.

D. None of the above.

What is the correct answer?

4

Which one is true statement :

A. With finer degree of granularity of locking a high degree of concurrency is possible.

B. Locking prevents non-serializable schedules.

C. Locking cannot take place at field level.

D. An exclusive lock on data item X is granted even if a shared lock is already held on X.

What is the correct answer?

4

A ______ module is typically designed so that it will run on a user workstation or personal computer.

A. Software

B. Server

C. Program

D. Client

What is the correct answer?

4

Manager salary details are hidden from the employee .This is

A. Conceptual level data hiding.

B. External level data hiding.

C. Physical level data hiding.

D. None of these.

What is the correct answer?

4

In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect :

A. Operationally, if Y is deleted, so is X

B. existence is dependent on Y.

C. Operationally, if X is deleted, so is Y.

D. Operationally, if X is deleted, & remains the same.

What is the correct answer?

4

Checkpoints are a part of

A. Recovery measures.

B. Security measures.

C. Concurrency measures.

D. uthorization measures.

What is the correct answer?

4

The full form of GUI is _________

A. Government Union Internet

B. Graphical Unit Interface

C. Graphical User Interface

D. Graphical University Interface

What is the correct answer?

4

Which of the following is a reason to model data?

A. Understand each user's perspective of data

B. Understand the data itself irrespective of the physical representation

C. Understand the use of data across application areas

D. All of the above

What is the correct answer?

4

The fact that information in the data warehouse changes far less often and may be regarded as non-real-time with periodic updating; This implies that data warehouses are _______

A. Volatile

B. Non - Volatile

C. Logical

D. Physical

What is the correct answer?

4

An advantage of the database management approach is

A. data redundancy increases

B. data is dependent on programs

C. data is integrated and can be accessed by multiple programs

D. none of the above

What is the correct answer?

4

A logical schema

A. is the entire database

B. Describes how data is actually stored on disk.

C. is a standard way of organizing information into accessible parts.

D. All of the above

What is the correct answer?

4

The drawback of shadow paging technique are

A. Commit overhead

B. Data fragmentation

C. Garbage collection

D. All of these

What is the correct answer?

4

Drop Table cannot be used to drop a table referenced by a ______ constraint.

A. Primary Key

B. Local Key

C. Foreign Key

D. Composite Key