Home
Current Affairs January 2024

What is the correct answer?

4

Relations produced from an E-R model will always be

A. First normal form.

B. Second normal form.

C. Third normal form.

D. Fourth normal form.

Correct Answer :

A. First normal form.


Related Questions

What is the correct answer?

4

Which of the following relational algebra operations do not require the participating tables to be union-compatible?

A. Union

B. Intersection

C. Difference

D. Join

What is the correct answer?

4

In a multi-user database, if two users wish to update the same record at the same time, they are prevented from doing so by

A. jamming

B. password

C. documentation

D. record lock

What is the correct answer?

4

A ______ module is typically designed so that it will run on a user workstation or personal computer.

A. Software

B. Server

C. Program

D. Client

What is the correct answer?

4

Manager salary details are hidden from the employee .This is

A. Conceptual level data hiding.

B. External level data hiding.

C. Physical level data hiding.

D. None of these.

What is the correct answer?

4

Data independence means

A. data is defined separately and not included in programs.

B. programs are not dependent on the physical attributes of data

C. programs are not dependent on the logical attributes of data

D. both B and C

What is the correct answer?

4

What is data integrity?

A. It is the data contained in database that is non redundant.

B. It is the data contained in database that is accurate and consistent.

C. It is the data contained in database that is secured.

D. It is the data contained in database that is shared.

What is the correct answer?

4

In an E-R, Y is the dominant entity and X is a subordinate entity. Then which of the following is incorrect :

A. Operationally, if Y is deleted, so is X

B. existence is dependent on Y.

C. Operationally, if X is deleted, so is Y.

D. Operationally, if X is deleted, & remains the same.

What is the correct answer?

4

______is a preferred method for enforcing data integrity

A. Constraints

B. Triggers

C. Stored procedure

D. Cursors

What is the correct answer?

4

Relationships among relationships can be represented in an-E-R model using

A. Aggregation

B. Association

C. Weak entity sets

D. Weak relationship sets

What is the correct answer?

4

A _____ is used to define overall design of the database

A. code

B. data definition language

C. application program

D. schema

What is the correct answer?

4

Which of the following constitutes a basic set of operations for manipulating relational data?

A. Predicate calculus

B. Relational calculus

C. Relational algebra

D. SQL

What is the correct answer?

4

If a transaction T has obtained an exclusive lock on item Q, then T can

A. read Q

B. write Q

C. both read and write Q

D. write Q but not read Q

What is the correct answer?

4

A logical schema

A. is the entire database

B. Describes how data is actually stored on disk.

C. is a standard way of organizing information into accessible parts.

D. All of the above

What is the correct answer?

4

Which of the following concurrency control schemes is not based on the serializability property?

A. Two - phase locking

B. Graph-based locking

C. Time-stamp based locking

D. None of these .

What is the correct answer?

4

Change Staff table by removing default of Assistant for position column

A. ALTER TABLE Staff ALTER position DROP DEFAULT;

B. ALTER TABLE Staff ALTER position DEFAULT;

C. ALTER TABLE Staff ALTER DROP DEFAULT;

D. MODIFY Staff ALTER position DROP DEFAULT;

What is the correct answer?

4

The division operator divides a dividend A of degree m+n by a divisor relation B of degree n and produces a result of degree

A. m - 1

B. m + 1

C. m * m

D. m

What is the correct answer?

4

E-R Modeling is achieved by using ____ diagrams

A. DFD

B. Flowcharts

C. Gantt Charts

D. E-R

What is the correct answer?

4

Immediate database modification technique uses

A. Both undo and redo.

B. Undo but no redo.

C. Redo but no undo.

D. Neither undo nor redo.

What is the correct answer?

4

Protection of data from unauthorized Disclosure results in loss of _______

A. Integrity

B. Availability

C. Confidentiality

D. Discretionary Security

What is the correct answer?

4

Which of the following is not a characteristic of a relational database model?

A. Table

B. Tree like structure

C. Complex logical relationship

D. Records

What is the correct answer?

4

Cascading rollback is avoided in all protocol except

A. strict two-phase locking protocol.

B. tree locking protocol

C. two-phase locking protocol

D. validation based protocol.

What is the correct answer?

4

The normalization was first proposed by .

A. Code

B. Codd

C. Boyce Codd

D. Boyce

What is the correct answer?

4

Which is the best file organization when data is frequently added or deleted from a file?

A. Sequential

B. Direct

C. Index sequential

D. None of the above

What is the correct answer?

4

If both the functional dependencies : X�Y and Y�X hold for two attributes X and Y then the relationship between X and Y is

A. M:N

B. M:1

D. 1:M

What is the correct answer?

4

Use of UNIQUE while defining an attribute of a table in SQL means that the attribute values are

A. distinct values

B. cannot have NULL

C. both (A) & (B)

D. same as primary key

What is the correct answer?

4

The values of the attribute describes a particular

A. Entity set

B. File

C. Entity instance

D. Organization

What is the correct answer?

4

Given the following relation S(SNO,SNAME,CITY) write a query to update the value of CITY to KANPUR for the supplier S1.

A. UPDATE S CITY = KANPUR WHERE SNO=S1

B. UPDATE S SET CITY = KANPUR FOR SNO=S1

C. UPDATE S SET CITY = KANPUR WHERE SNO=S1

D. UPDATE S RENAME CITY = KANPUR WHERE SNO=S1

What is the correct answer?

4

Which of the following ensures the atomicity of the transaction?

A. Transaction management component of DBMS

B. Application Programmer

C. Concurrency control component of DBMS

D. Recovery management component of DBMS

What is the correct answer?

4

Checkpoints are a part of

A. Recovery measures.

B. Security measures.

C. Concurrency measures.

D. uthorization measures.

What is the correct answer?

4

Which normal form is considered adequate for normal relational database design?

A. 2NF

B. 5NF

C. 4NF

D. 3NF