Related Questions
What is the correct answer?
4
When all attributes in a relation tuple are not functionally dependent only on the key attribute. Which of the following normalization is needed?
What is the correct answer?
4
A table that displays data redundancies yields ____________ anomalies
What is the correct answer?
4
An advantage of the database management approach is
A. data is dependent on programs.
B. data redundancy increases.
C. data is integrated and can be accessed by multiple programs.
What is the correct answer?
4
In defining the notion of the tuple variable, which one of the clause is useful?
What is the correct answer?
4
What does the number of attributes in a relation is called?
What is the correct answer?
4
Which of the following submit and execute query at run time?
What is the correct answer?
4
Range variables are designed using the
What is the correct answer?
4
Tape storage is referred to as
A. sequential access storage
What is the correct answer?
4
In which of the random-access method, stations do not sense the medium?
What is the correct answer?
4
In E-R diagram Generalization is represented by
What is the correct answer?
4
Which of the following aggregate function doesnt ignore NULLs in its results?
What is the correct answer?
4
The database environment has all of the following components except:
D. database administrator.
What is the correct answer?
4
Noiseless channel has ……… types of protocols.
What is the correct answer?
4
In two-phase locking protocol the two phases are
A. growing phase and shrinking phase
B. execution phase and blocking phase.
C. running phase and sleeping phase.
What is the correct answer?
4
The attribute that can be divided into other attributes is called
C. Multi-valued Attribute
What is the correct answer?
4
FDDI protocol operates in
i) Transport layer
ii) Network layer
iii) Datalink layer
iv) Physical layer
What is the correct answer?
4
In an object oriented model, one object can access data of another object by passing?
What is the correct answer?
4
It is possible to define a schema completely using
What is the correct answer?
4
What is the result of the following SQL statement ?
SELECT A.emp_Name, B.ph_num
FROM emp A LEFT OUTER JOIN phone B
ON A. emp_ID = B.emp_ID
A. A list of employees phone number
B. A list of all employees that have spouses, with phone number included in the list
C. A list of all employees names, including the phone number if they have one
D. Two lists : One list of employees, the other of phone numbers
What is the correct answer?
4
Count function in SQL returns the number of
What is the correct answer?
4
Which of the following layer uses trailer of the frame for error detection?
What is the correct answer?
4
The host part in a class A type of an IP address has
What is the correct answer?
4
Consider the join of a relation R with relation S. If R has m tuples and S has n tuples,
then the maximum size of join is:
What is the correct answer?
4
Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization
What is the correct answer?
4
Select the correct
i) A timestamp-based scheduler cant produce live lock
ii) Aggregate functions cant appear with HAVING clause.
iii) Isolation is a property of database transaction.
What is the correct answer?
4
Which of the following will NOT eliminates the ambiguities of a null value?
A. Define the attribute as required
C. Define each attribute as having an initial value that is recognized as blank
What is the correct answer?
4
EEPROM
A. Electrically Extractable Programmable Read Only Memory
B. Electrically Erasable Programmable Read Only Memory
C. Electronically Erasable Programmable Read Only Memory
D. Electrically Erasable Programmable Read Only Memory
What is the correct answer?
4
What is the max data capacity of STP?
What is the correct answer?
4
State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable
What is the correct answer?
4
Technique used in log based recovery
A. Immediate database modification