Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following is a reason to model data?

A. Understand each user's perspective of data

B. Understand the data itself irrespective of the physical representation

C. Understand the use of data across application areas

D. All of the above

Correct Answer :

D. All of the above


Related Questions

What is the correct answer?

4

Drop Table cannot be used to drop a table referenced by a ______ constraint.

A. Primary Key

B. Local Key

C. Foreign Key

D. Composite Key

What is the correct answer?

4

Data items grouped together for storage purposes are called a

A. record

B. string

C. title

D. list

What is the correct answer?

4

Key to represent relationship between tables is called

A. primary key

B. secondary key

C. foreign key

D. none of the above

What is the correct answer?

4

If two relations R and S are joined, then the non matching tuples of both R and S are ignored in

A. left outer join

B. right outer join

C. full outer join

D. inner join

What is the correct answer?

4

Checkpoints are a part of

A. Recovery measures.

B. Security measures.

C. Concurrency measures.

D. uthorization measures.

What is the correct answer?

4

In multiple granularity of locks SIX lock is compatible with

A. IX

B. IS

C. S

D. SIX

What is the correct answer?

4

By ______ an area on disk in certain ways, one can make it represent a bit value of either zero (0) or one (1).

A. Vulcanizing

B. Galvanizing

C. Magnetizing

D. Passing UV rays

What is the correct answer?

4

The normal form that is not necessarily dependency preserving is

A. 2NF

B. 3NF

C. BCNF

D. 4NF

What is the correct answer?

4

For correct behaviour during recovery, undo and redo operation must be

A. Commutative

B. Associative

C. idempotent

D. distributive

What is the correct answer?

4

A list consists of last names, first names, addresses and pin codes. If all people in the list have the same last name and same pin code a useful key would be

A. the pin code

B. the last name

C. the compound key first name and last name

D. Tr from next page

What is the correct answer?

4

The _______ is a set of programs to use and / or modify this data.

A. DBMS

B. System

C. Program

D. Software

What is the correct answer?

4

What is a disjoint less constraint?

A. It requires that an entity belongs to no more than one level entity set.

B. The same entity may belong to more than one level.

C. The database must contain an unmatched foreign key value.

D. An entity can be joined with another entity in the same level entity set.

What is the correct answer?

4

The data in the database at a particular moment of time is called the _______

A. Snapshot

B. Dynaset

C. Stateless

D. Stateful

What is the correct answer?

4

A table can have only one

A. Secondary key

B. Alternate key

C. Unique key

D. Primary key

What is the correct answer?

4

In 2NF

A. No functional dependencies (FDs) exist.

B. No multivalued dependencies (MVDs) exist.

C. No partial FDs exist.

D. No partial MVDs exist.

What is the correct answer?

4

The drawback of shadow paging technique are

A. Commit overhead

B. Data fragmentation

C. Garbage collection

D. All of these

What is the correct answer?

4

operator is used to compare a value to a list of literals values that have been specified.

A. Like

B. COMPARE

C. BETWEEN

D. IN

What is the correct answer?

4

Which of the following is not a characteristic of a relational database model?

A. Table

B. Tree like structure

C. Complex logical relationship

D. Records

What is the correct answer?

4

The collection of information stored in a database at a particular moment is called as ......

A. schema

B. instance of the database

C. data domain

D. independence

What is the correct answer?

4

Which of the syntax is correct for insert statement?
i) insert into values
ii) insert into (column list) values

A. i-only

B. ii-only

C. Both of them

D. None of them

What is the correct answer?

4

If a transaction T has obtained an exclusive lock on item Q, then T can

A. read Q

B. write Q

C. both read and write Q

D. write Q but not read Q

What is the correct answer?

4

Manager salary details are hidden from the employee .This is

A. Conceptual level data hiding.

B. External level data hiding.

C. Physical level data hiding.

D. None of these.

What is the correct answer?

4

______is a preferred method for enforcing data integrity

A. Constraints

B. Triggers

C. Stored procedure

D. Cursors

What is the correct answer?

4

In SQL the statement select * from R, S is equivalent to

A. Select * from R natural join S.

B. Select * from R cross join S.

C. Select * from R union join S.

D. Select * from R inner join S.

What is the correct answer?

4

Shadow paging has

A. no redo

B. no undo

C. redo but no undo

D. neither redo nor undo

What is the correct answer?

4

Relationships among relationships can be represented in an-E-R model using

A. Aggregation

B. Association

C. Weak entity sets

D. Weak relationship sets

What is the correct answer?

4

As per equivalence rules for query transformation, selection operation distributes over

A. Union.

B. Set difference.

C. Intersection.

D. All of the above.

What is the correct answer?

4

Tree structures are used to store data in

A. Network model.

B. Relational model.

C. Hierarchical model.

D. File based system.

What is the correct answer?

4

An advantage of the database management approach is

A. data redundancy increases

B. data is dependent on programs

C. data is integrated and can be accessed by multiple programs

D. none of the above

What is the correct answer?

4

The data models defined by ANSI/SPARC architecture are

A. Conceptual, physical and internal

B. Conceptual, view and external

C. Logical, physical and internal

D. Logical, physical and view