Home
Current Affairs January 2024

What is the correct answer?

4

The access protocol used by traditional Ethernet

A. CSMA/CA

B. CSMA/CD

C. CSMA

D. Token ring

Correct Answer :

B. CSMA/CD


Related Questions

What is the correct answer?

4

In a Hierarchical model records are organized as

A. Graph.

B. List.

C. Links.

D. Tree.

What is the correct answer?

4

Datalog is

A. procedural query language

B. nonprocedural query language

C. scan(), write()

D. none of the above

What is the correct answer?

4

In an object oriented model, one object can access data of another object by passing?

A. Instance variable

B. Variable

C. Message

D. Function

What is the correct answer?

4

What are the different types of radio waves that are used for computer network applications?
i) Spread spectrum
ii) High power, single frequency
iii) High power, multiple frequency
iv) Low power, single frequency
v) Low power, multiple frequency

A. i, ii and iii only

B. i, ii and iv only

C. ii, iii and iv only

D. i, iii and iv only

What is the correct answer?

4

Which of the following is logical topology?

A. Bus

B. Ring

C. Star

D. None of these

What is the correct answer?

4

Volatile storage

A. loses its contents when power is switched off.

B. doesnt loses its contents when power is switched off.

C. creates backup when power is switched off.

D. none

What is the correct answer?

4

The method by which the structure of the database is modified to eliminate hidden dependencies and replacing groups is

A. Normalization

B. Indexing

C. Enforcing referential integrity

D. Enforcing data integrity

What is the correct answer?

4

DBMS utility which allows to reconstruct the correct state of database from the backup and history of transactions

A. Backup

B. Recovery

C. Grant

D. Troubleshooting

What is the correct answer?

4

The output of the Data Definition Language is stored in the

A. view table

B. schema

C. metadata

D. all of the above.

What is the correct answer?

4

Authorization command in SQL

A. Allow

B. Access

C. Grant

D. none of the above

What is the correct answer?

4

DECLARE is a(an)

A. executable statement.

B. declarative statement.

C. Ordered file

D. none of the above

What is the correct answer?

4

A data dictionary contains:
i) The name of all fields in all files.
ii) The data type of all fields in all files.
iii) The width of all fields in all files.

A. only i)

B. only i) and ii)

C. only ii) and iii)

D. i) ii) iii)

What is the correct answer?

4

B-Tree is used for

A. searching data

B. storing data

C. both A and B

D. none of these

What is the correct answer?

4

The access protocol used by traditional Ethernet

A. CSMA/CA

B. CSMA/CD

C. CSMA

D. Token ring

What is the correct answer?

4

The physical location of a record is determined by a mathematical formula that transforms
a file key into a record location is :

A. B-Tree File

B. Hashed File

C. Indexed File

D. Sequential file.

What is the correct answer?

4

Data Manipulation Language DML) is not to

A. Create information table in the Database

B. Insertion of new information into the Database

C. Deletion of information in the Database

D. Modification of information in the Database

What is the correct answer?

4

In two-phase locking

A. the data items are locked in growing phase.

B. the data items are released in shrinking phase.

C. Both A and B are true

D. Both A and B are false

What is the correct answer?

4

…………… is responsible for using that the database remains in a consistent state despite system failure.

A. Storage manager

B. Admin

C. Transaction manager

D. none of the above

What is the correct answer?

4

Mail services are available to network users through the

A. Session layer

B. Presentation layer

C. Application layer

D. Transport layer

What is the correct answer?

4

Select the incorrect statement

A. View is derived from other tables.

B. Once a transaction has executed commit work its effect cant be undone by rollback work .

C. The input to the aggregate function avg can be non numeric data types

D. A primary key can never be null.

What is the correct answer?

4

Transaction processing is associated with everything below except

A. producing detail, summary, or exception reports.

B. recording a business activity.

C. confirming an action or triggering a response.

D. maintaining data.

What is the correct answer?

4

The attribute that can be divided into other attributes is called

A. Simple Attribute

B. Composite Attribute

C. Multi-valued Attribute

D. Derived Attribute

What is the correct answer?

4

Usenet is also known as

A. Newsgroups

B. 10Km to 1Km

C. 10^3Km to 100Km

D. 100M to 10M

What is the correct answer?

4

Symbol to represent weak entity set in ER Model

A. Dotted rectangle

B. Square

C. Doubly outlined rectangle

D. Diamond

What is the correct answer?

4

Relational Algebra is

A. Data Definition Language.

B. Data Manipulation Language

C. Procedural query Language

D. None of the above

What is the correct answer?

4

An operation that will increase the length of a list is

A. insert

B. modify

C. lookup

D. none of the above

What is the correct answer?

4

Every Boyce-Codd normal form is in

A. 3NF

B. 2NF

C. 1NF

D. none of the above

What is the correct answer?

4

The maximum number of children in a B-tree of order m is

A. m+1

B. m

C. m-1

D. m/2

What is the correct answer?

4

Functional dependencies are generalization of

A. Relation dependencies

B. Data dependencies

C. key dependencies

D. none of the above

What is the correct answer?

4

In RDBMS, Data is presented as a collection of

A. Relation

B. Table

C. Attribute

D. Entity