Home
Current Affairs January 2024

What is the correct answer?

4

The method of access which uses key transformation is known as

A. direct.

B. hash.

C. random.

D. sequential.

Correct Answer :

B. hash.


Related Questions

What is the correct answer?

4

A transaction is said to have terminated if it has

A. either committed or aborted

B. either partially committed or aborted

C. either committed or failed

D. none of these

What is the correct answer?

4

Count function in SQL returns the number of

A. values.

B. distinct values.

C. groups.

D. columns.

What is the correct answer?

4

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. Field-level lock

B. Row-level lock

C. Table-level lock

D. Database-level lock

What is the correct answer?

4

An association of several structure of a data base can be expressed graphically by?

A. Tuple

B. Record

C. Relationship

D. Field

What is the correct answer?

4

A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only

B. ii and iii only

C. i and iii only

D. iii and iv only

What is the correct answer?

4

Which of the following submit and execute query at run time?

A. Static SQL

B. Dynamic SQL

C. both

D. none of these

What is the correct answer?

4

A transaction which completes successfully is called

A. Granted

B. Committed

C. Compensated

D. Accomplished

What is the correct answer?

4

A transaction which may not complete its execution successfully is termed as

A. Failed

B. Aborted

C. Blocked

D. Finished

What is the correct answer?

4

A functional dependency between two or more non-key attributes is called

A. Transitive dependency

B. Partial transitive dependency

C. Functional dependency

D. Partial functional dependency

What is the correct answer?

4

Technique used in log based recovery

A. Immediate database modification

B. Graph-based recovery

C. key dependencies

D. none of the above

What is the correct answer?

4

RAID

A. Redundant Arrays of Independent Disks

B. Redundant Arrays of Independent Drives

C. Redundant Arrays of Interconnected Drives

D. Redundant Arrays of Interconnected Disks

What is the correct answer?

4

Which of the following is a classical approach to database design?

A. Left Right approach

B. Right Left approach

C. Top Down approach

D. Bottom Up approach

What is the correct answer?

4

Every Boyce-Codd normal form is in

A. 3NF

B. 2NF

C. 1NF

D. none of the above

What is the correct answer?

4

Which of the following operator preserves unmatched rows of the relations being joined?

A. Inner join

B. Outer join

C. union

D. Intersect

What is the correct answer?

4

In a Hierarchical model records are organized as

A. Graph.

B. List.

C. Links.

D. Tree.

What is the correct answer?

4

Datalog is

A. procedural query language

B. nonprocedural query language

C. scan(), write()

D. none of the above

What is the correct answer?

4

Secondary storage

A. magnetic disk

B. magnetic tape

C. juke box

D. cache

What is the correct answer?

4

Primary storage

A. magnetic disk

B. magnetic tape

C. juke box

D. cache

What is the correct answer?

4

In case of entity integrity, the primary key may be

A. not Null

B. Null

C. both Null & not Null.

D. any value.

What is the correct answer?

4

Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only

B. ii and iii only

C. i and iii only

D. All i, ii iii

What is the correct answer?

4

Which of the following layer uses trailer of the frame for error detection?

A. Transport layer

B. Network layer

C. Datalink layer

D. None of these

What is the correct answer?

4

Disk storage is referred to as

A. sequential access storage

B. direct access storage

C. random access storage

D. none of the above

What is the correct answer?

4

What is ACID properties of Transactions?

A. Atomicity, Consistency, Isolation, Database

B. Atomicity, Consistency, Isolation, Durability

C. Atomicity, Consistency, Inconsistent, Durability

D. Automatically, Concurrency, Isolation, Durability

What is the correct answer?

4

For large networks, _______ topology is used

A. Ring

B. Bus

C. Mesh

D. none of these

What is the correct answer?

4

State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only

B. ii and iii only

C. i and iii only

D. None of these

What is the correct answer?

4

A ………… clause permits a view definition to be used in multiple places within a query.

A. where

B. exist

C. with

D. select

What is the correct answer?

4

The left outer join takes all tuples

A. in the left relation which didnt match with any tuple in right relation

B. in the left relation which matched with a tuple in right relation

C. in the right relation which didnt match with any tuple in left relation

D. in the right relation which matched with a tuple in left relation

What is the correct answer?

4

Which command is used to cancel privileges granted through the GRANT command ?

A. CANCEL

B. OVER

C. STOP

D. REVOKE

What is the correct answer?

4

Size of source and destination address in IP header

A. 4 bits

B. 8 bits

C. 12 bits

D. 32 bits

What is the correct answer?

4

Select the correct statement
i) Aggregate functions work on a group of data and return a single value.
ii) ODBC connects the frontend with the database without considering its compatibility
iii) View definition cant be used at multiple places through with clause .

A. i and ii only

B. ii and iii only

C. i and iii only

D. i only