Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following is logical topology?

A. Bus

B. Ring

C. Star

D. None of these

Correct Answer :

B. Ring


Related Questions

What is the correct answer?

4

In an E-R diagram attributes are represented by

A. rectangle.

B. square.

C. ellipse.

D. triangle.

What is the correct answer?

4

Repeaters operate in
i) Physical layer
ii) Datalink layer
iii) Transport layer
iv) Network layer

A. i and ii only

B. ii and iii only

C. ii only

D. i only

What is the correct answer?

4

Only one communication channel is needed rather than n channels to transmit data between two communicating devices

A. parallel

B. serial

C. analog

D. digital

What is the correct answer?

4

A subschema expresses

A. the logical view.

B. the physical view.

C. the external view.

D. all of the above.

What is the correct answer?

4

A functional dependency between two or more non-key attributes is called

A. Transitive dependency

B. Partial transitive dependency

C. Functional dependency

D. Partial functional dependency

What is the correct answer?

4

As a side-effect of database update ,the system automatically executes a statement called

A. a view

B. a grant permission

C. a trigger

D. all of the above

What is the correct answer?

4

Select the correct
i) A timestamp-based scheduler cant produce live lock
ii) Aggregate functions cant appear with HAVING clause.
iii) Isolation is a property of database transaction.

A. i and ii only

B. ii and iii only

C. i and iii only

D. i only

What is the correct answer?

4

In an Entity-Relationship Diagram Ellipses represents

A. Attributes

B. Weak entity set

C. Relationship sets

D. Multi-valued attributes

What is the correct answer?

4

Size of source and destination address in IP header

A. 4 bits

B. 8 bits

C. 12 bits

D. 32 bits

What is the correct answer?

4

Which of the following normalization is needed, if an attribute of a composite key is dependent on an attribute of the other composite key?

A. BCNF

B. Second

C. Third

D. Fourth

What is the correct answer?

4

Which of the following file organization provides very fast access to any arbitrary record of a file?

A. Ordered file

B. Unordered file

C. Hashed file

D. B-tree

What is the correct answer?

4

Three SQL, DDL, CREATE commands are

A. Schema, Base and Table

B. Schema, Table and View

C. Base, Table and Schema

D. Key, Base and Table

What is the correct answer?

4

Extended Entity Relationship model consists of which of the following
i) Specialization
ii) Generalization
iii) Categorization

A. i and ii only

B. ii and iii only

C. i and iii only

D. All i, ii iii

What is the correct answer?

4

Usenet is also known as

A. Newsgroups

B. 10Km to 1Km

C. 10^3Km to 100Km

D. 100M to 10M

What is the correct answer?

4

Relational Algebra is

A. Data Definition Language.

B. Data Manipulation Language

C. Procedural query Language

D. None of the above

What is the correct answer?

4

In two-phase locking

A. the data items are locked in growing phase.

B. the data items are released in shrinking phase.

C. Both A and B are true

D. Both A and B are false

What is the correct answer?

4

The statement in SQL which allows to change the definition of a table is

A. Select

B. Update

C. Create

D. Alter

What is the correct answer?

4

Natural mask for a Class A network

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. none of these

What is the correct answer?

4

Cross Product is a:

A. Unary Operator

B. Binary Operator

C. Ternary Operator

D. none of the above

What is the correct answer?

4

What is the result of the following SQL statement ?
SELECT A.emp_Name, B.ph_num
FROM emp A LEFT OUTER JOIN phone B
ON A. emp_ID = B.emp_ID

A. A list of employees phone number

B. A list of all employees that have spouses, with phone number included in the list

C. A list of all employees names, including the phone number if they have one

D. Two lists : One list of employees, the other of phone numbers

What is the correct answer?

4

The output of the Data Definition Language is stored in the

A. view table

B. schema

C. metadata

D. all of the above.

What is the correct answer?

4

Specialization is a

A. top-down approach.

B. bottom-up approach.

C. left-right approach.

D. none of the above

What is the correct answer?

4

Which command is used to cancel privileges granted through the GRANT command ?

A. CANCEL

B. OVER

C. STOP

D. REVOKE

What is the correct answer?

4

Tape storage is referred to as

A. sequential access storage

B. direct access storage

C. random access storage

D. none of the above

What is the correct answer?

4

The language used in application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. VDL

D. SDL

What is the correct answer?

4

View never contains derived columns.

A. True

B. False

C. Cant say

D. none

What is the correct answer?

4

In two-phase locking protocol the two phases are

A. growing phase and shrinking phase

B. execution phase and blocking phase.

C. running phase and sleeping phase.

D. none of the above

What is the correct answer?

4

What does a field or a combination of fields that has a unique value called ?

A. Foreign key

B. Secondary key

C. Primary key

D. Alternate key

What is the correct answer?

4

In case of entity integrity, the primary key may be

A. not Null

B. Null

C. both Null & not Null.

D. any value.

What is the correct answer?

4

Data integrity refers to

A. the uniqueness of the data in a database

B. the correctness and completeness of the data in a database

C. the un redundancies of the data in a database

D. Data independence of the database