Home
Current Affairs January 2024

What is the correct answer?

4

Transaction processing is associated with everything below except

A. producing detail, summary, or exception reports.

B. recording a business activity.

C. confirming an action or triggering a response.

D. maintaining data.

Correct Answer :

C. confirming an action or triggering a response.


Related Questions

What is the correct answer?

4

For large networks, _______ topology is used

A. Ring

B. Bus

C. Mesh

D. none of these

What is the correct answer?

4

Data stored in cursor is called ……………

A. record

B. active data set

C. object

D. none of the above

What is the correct answer?

4

Tape storage is referred to as

A. sequential access storage

B. direct access storage

C. random access storage

D. none of the above

What is the correct answer?

4

The number of cursors depend on the

A. number of queries

B. number of attributes

C. size of memory area

D. none of these

What is the correct answer?

4

A transaction has following states
i) Active
ii) Fail
iii) Abort
iv) Commit

A. i and ii only

B. ii and iii only

C. i and iii only

D. iii and iv only

What is the correct answer?

4

The maximum number of children in a B-tree of order m is

A. m+1

B. m

C. m-1

D. m/2

What is the correct answer?

4

Which of the following are the properties of entities?

A. Groups

B. Table

C. Attributes

D. Switchboards

What is the correct answer?

4

The command used to delete a particular column in a relation

A. UPDATE

B. DROP

C. ALTER

D. DELETE

What is the correct answer?

4

Full form of CIDR

A. Classful Inter Domain Routing

B. Classless International Domain Routing

C. Classless Inter Domain Routing

D. none of these

What is the correct answer?

4

File organization that provides fast access to any arbitrary record

A. Hashed file

B. B-tree

C. Ordered file

D. Unordered file

What is the correct answer?

4

Referential integrity

A. controls relationships between operations of an object

B. controls relationships between instances of a class

C. controls relationships between attributes in a table

D. controls relationships between tables in a database

What is the correct answer?

4

Tertiary storage

A. magnetic tape

B. juke box

C. optical disk

D. All of the above

What is the correct answer?

4

Mail services are available to network users through the

A. Session layer

B. Presentation layer

C. Application layer

D. Transport layer

What is the correct answer?

4

Count function in SQL returns the number of

A. values.

B. distinct values.

C. groups.

D. columns.

What is the correct answer?

4

RAID

A. Redundant Arrays of Independent Disks

B. Redundant Arrays of Independent Drives

C. Redundant Arrays of Interconnected Drives

D. Redundant Arrays of Interconnected Disks

What is the correct answer?

4

Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer

A. i and ii only

B. ii and iii only

C. ii only

D. i only

What is the correct answer?

4

A logical schema

A. is the entire database.

B. is a standard way of organizing information into accessible parts.

C. describes how data is actually stored on disk.

D. both A) and C)

What is the correct answer?

4

Authorization command in SQL

A. Allow

B. Access

C. Grant

D. none of the above

What is the correct answer?

4

Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?

A. BCNF

B. Second

C. Third

D. Fourth

What is the correct answer?

4

Triggers are also called

A. active rules

B. passive rules

C. inferences

D. none of the above

What is the correct answer?

4

The method of access which uses key transformation is known as

A. direct.

B. hash.

C. random.

D. sequential.

What is the correct answer?

4

The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only

B. ii and iv only

C. ii and iv only

D. i, iv only

What is the correct answer?

4

The ________ states that a foreign key must either match a primary key value in another relation or it must be null.

A. entity integrity rule

B. referential integrity constraint

C. composite attribute

D. action assertion

What is the correct answer?

4

Which one of the following is provided by a data dictionary ?

A. User data

B. Database structure data

C. Sorted data

D. Functional data

What is the correct answer?

4

Which of the following is/are error-free channel(s)
i) Noisy channel
ii) Noiseless channel

A. i only

B. ii only

C. Both

D. None of these

What is the correct answer?

4

In an Entity-Relationship Diagram Diamonds represents

A. Attributes

B. Multi-valued attributes

C. Weak entity set

D. Relationship sets

What is the correct answer?

4

Noiseless channel has ……… types of protocols.

A. 2

B. 3

C. 4

D. 5

What is the correct answer?

4

Natural mask for a Class A network

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. none of these

What is the correct answer?

4

FDDI protocol operates in
i) Transport layer
ii) Network layer
iii) Datalink layer
iv) Physical layer

A. i and ii only

B. ii and iii only

C. i and iii only

D. iii and iv only

What is the correct answer?

4

Select the incorrect statement(s)
i) Shared locks are compatible with each other.
ii) A relation which is in 3NF may have redundancy due to composite keys.
iii) A table in a database can have multiple indexes.

A. i only

B. ii, only

C. ii, iii only

D. none of the above