Home
Current Affairs January 2024

What is the correct answer?

4

Symbol to represent weak entity set in ER Model

A. Dotted rectangle

B. Square

C. Doubly outlined rectangle

D. Diamond

Correct Answer :

C. Doubly outlined rectangle


Related Questions

What is the correct answer?

4

Which of the following is not a database object?

A. index

B. sequence

C. cursor

D. trigger

What is the correct answer?

4

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. Field-level lock

B. Row-level lock

C. Table-level lock

D. Database-level lock

What is the correct answer?

4

Database locking concept is used to solve the problem of

A. Lost Update

B. Uncommitted Dependency

C. Inconsistent Data

D. All of the above

What is the correct answer?

4

The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File

B. Hashed File

C. Indexed File

D. Sequential file.

What is the correct answer?

4

The database environment has all of the following components except:

A. users.

B. separate files.

C. database.

D. database administrator.

What is the correct answer?

4

Which of the following statements is not true about two tier client server database architecture?

A. SQL statements are processed on tier server

B. SQL statements may be processed on some of the clients

C. Business logic is mostly processed on clients

D. Business logic may be processed on the server

What is the correct answer?

4

Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?

A. BCNF

B. Second

C. Third

D. Fourth

What is the correct answer?

4

which of the following is a binary operation?

A. project

B. select

C. rename

D. none of the above

What is the correct answer?

4

Object based data models are used in describing the abstraction of the following levels?

A. Conceptual and view

B. Only physical

C. Physical and conceptual

D. Only conceptual

What is the correct answer?

4

Radio frequencies below ............. are more suitable for omnidirectional applications.

A. 300MHz

B. 1GHz

C. 5GHz

D. 10 GHz

What is the correct answer?

4

In the architecture of a database system external level is the

A. physical level.

B. logical level.

C. conceptual level

D. view level.

What is the correct answer?

4

Which one of the following statements is false?

A. The data dictionary is normally maintained by the database administrator.

B. Data elements in the database can be modified by changing the data dictionary.

C. The data dictionary contains the name and description of each data element.

D. The data dictionary is a tool used exclusively by the database administrator.

What is the correct answer?

4

What is the result of the following SQL statement ?
SELECT A.emp_Name, B.ph_num
FROM emp A LEFT OUTER JOIN phone B
ON A. emp_ID = B.emp_ID

A. A list of employees phone number

B. A list of all employees that have spouses, with phone number included in the list

C. A list of all employees names, including the phone number if they have one

D. Two lists : One list of employees, the other of phone numbers

What is the correct answer?

4

Select the incorrect statement

A. BCNF is stronger than 3NF

B. Relational algebra is a non-procedural language

C. Every conflict serializable schedule is view serializable.

D. none of the above

What is the correct answer?

4

The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is

A. Normalization

B. Indexing

C. Enforcing referential integrity

D. Enforcing data integrity

What is the correct answer?

4

The language used in application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. VDL

D. SDL

What is the correct answer?

4

.................. occurs due to velocity of propagation the frequency varies. Thus various frequency components of a signal arrive at the receiver at different times.

A. Noise

B. Delay distortion

C. Attenuation distortion

D. Dispersion

What is the correct answer?

4

Symbol to represent weak entity set in ER Model

A. Dotted rectangle

B. Square

C. Doubly outlined rectangle

D. Diamond

What is the correct answer?

4

In an Entity-Relationship Diagram Diamonds represents

A. Attributes

B. Multi-valued attributes

C. Weak entity set

D. Relationship sets

What is the correct answer?

4

The mode in which data item may be locked

A. Partner

B. Mutual

C. Exclusive

D. Atomic

What is the correct answer?

4

Which of the following produces the relation that has attributes of R1 and R2

A. Cartesian product

B. Difference

C. Intersection

D. Product

What is the correct answer?

4

Encoding method which does not provide for synchronization

A. B8ZS

B. Manchester

C. RZ

D. NRZ-L

What is the correct answer?

4

The overall design of a database is called

A. Subschema of the database

B. Schema of the database

C. Structure of the database

D. View of the database

What is the correct answer?

4

The statement
Every foreign-key value must match a primary-key value in an associated table
Is related to

A. View

B. Cursor defination

C. Referential intergrity

D. Trigger

What is the correct answer?

4

The ability to modify the conceptual schema without causing any change to the application program is known as

A. Physical data independence

B. Logical data independence

C. External data independence

D. Static data

What is the correct answer?

4

A DBMS query language is designed to

A. support end users who use English-like commands.

B. support in the development of complex applications software.

C. specify the structure of a database.

D. all of the above.

What is the correct answer?

4

In an E-R diagram attributes are represented by

A. rectangle.

B. square.

C. ellipse.

D. triangle.

What is the correct answer?

4

DBMS helps achieve

A. Data independence

B. Centralized control of data

C. Neither A) nor B)

D. both A) and B)

What is the correct answer?

4

EEPROM

A. Electrically Extractable Programmable Read Only Memory

B. Electrically Erasable Programmable Read Only Memory

C. Electronically Erasable Programmable Read Only Memory

D. Electrically Erasable Programmable Read Only Memory

What is the correct answer?

4

The method of access which uses key transformation is known as

A. direct.

B. hash.

C. random.

D. sequential.