Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following is the unit of signaling speed or modulation rate or the rate of symbol transmission?

A. Data rate

B. Bit rate

C. Signal to Noise Ratio

D. Baud rate

Correct Answer :

D. Baud rate


Related Questions

What is the correct answer?

4

DBMS helps achieve

A. Data independence

B. Centralized control of data

C. Neither A) nor B)

D. both A) and B)

What is the correct answer?

4

Log into a computer across an internet

A. IMAP

B. TELNET

C. POP3

D. Infrared

What is the correct answer?

4

Primary storage

A. magnetic disk

B. magnetic tape

C. juke box

D. cache

What is the correct answer?

4

The language used in application programs to request data from the DBMS is referred to as the

A. DML

B. DDL

C. VDL

D. SDL

What is the correct answer?

4

State which of the following statements are True
i) TCP is connection oriented but unreliable
ii) UDP is connection oriented but unreliable
iii) TCP is connectionless but reliable
iv) UDP is connectionless but reliable

A. i and ii only

B. ii and iii only

C. i and iii only

D. None of these

What is the correct answer?

4

A lock that allows concurrent transactions to access different rows of the same table is known as a

A. Field-level lock

B. Row-level lock

C. Table-level lock

D. Database-level lock

What is the correct answer?

4

FDDI protocol operates in
i) Transport layer
ii) Network layer
iii) Datalink layer
iv) Physical layer

A. i and ii only

B. ii and iii only

C. i and iii only

D. iii and iv only

What is the correct answer?

4

Multivalued dependency is removed in

A. 4 NF

B. 3 NF

C. 2 NF

D. 1 NF

What is the correct answer?

4

Natural mask for a Class A network

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. none of these

What is the correct answer?

4

The mode in which data item may be locked

A. Partner

B. Mutual

C. Exclusive

D. Atomic

What is the correct answer?

4

Transaction processing is associated with everything below except

A. producing detail, summary, or exception reports.

B. recording a business activity.

C. confirming an action or triggering a response.

D. maintaining data.

What is the correct answer?

4

A fragmentation is categorized in

A. 1 part

B. 2 part

C. 3 part

D. 4 part

What is the correct answer?

4

Technique used in log based recovery

A. Immediate database modification

B. Graph-based recovery

C. key dependencies

D. none of the above

What is the correct answer?

4

The class based addressing is known as

A. Classless addressing

B. Classful addressing

C. Classified addressing

D. Classical addressing

What is the correct answer?

4

In mesh topology, if the number of devices is n , then the number of ports present in each device is

A. n

B. n+1

C. n-1

D. n/2

What is the correct answer?

4

An advantage of the database management approach is

A. data is dependent on programs.

B. data redundancy increases.

C. data is integrated and can be accessed by multiple programs.

D. none of the above.

What is the correct answer?

4

Select the incorrect statement

A. View is derived from other tables.

B. Once a transaction has executed commit work its effect cant be undone by rollback work .

C. The input to the aggregate function avg can be non numeric data types

D. A primary key can never be null.

What is the correct answer?

4

Which of the following will NOT eliminates the ambiguities of a null value?

A. Define the attribute as required

B. Define subtypes

C. Define each attribute as having an initial value that is recognized as blank

D. Define supertypes

What is the correct answer?

4

What is the max data capacity of STP?

A. 1 Gbps

B. 56 Mbps

C. 100 Mbps

D. 256 Mbps

What is the correct answer?

4

The types of noiseless channels are
i) Selective Reject ARQ
ii) simplest protocol
iii) Go-Back-N ARQ
iv) Stop-and-Wait Protocol

A. i, ii only

B. ii and iv only

C. ii and iv only

D. i, iv only

What is the correct answer?

4

The access protocol used by traditional Ethernet

A. CSMA/CA

B. CSMA/CD

C. CSMA

D. Token ring

What is the correct answer?

4

B-Tree is used for

A. searching data

B. storing data

C. both A and B

D. none of these

What is the correct answer?

4

Unwanted energy from source other than the transmitter.

A. Attenuation

B. Distortion

C. Delay

D. Noise

What is the correct answer?

4

Select the correct
i) A timestamp-based scheduler cant produce live lock
ii) Aggregate functions cant appear with HAVING clause.
iii) Isolation is a property of database transaction.

A. i and ii only

B. ii and iii only

C. i and iii only

D. i only

What is the correct answer?

4

The database environment has all of the following components except:

A. users.

B. separate files.

C. database.

D. database administrator.

What is the correct answer?

4

The attribute that can be divided into other attributes is called

A. Simple Attribute

B. Composite Attribute

C. Multi-valued Attribute

D. Derived Attribute

What is the correct answer?

4

…………… is responsible for using that the database remains in a consistent state despite system failure.

A. Storage manager

B. Admin

C. Transaction manager

D. none of the above

What is the correct answer?

4

In this data model each record can hae more than one parent

A. Hierarchical model

B. E-R model

C. Network based model

D. none of these

What is the correct answer?

4

The overall design of a database is called

A. Subschema of the database

B. Schema of the database

C. Structure of the database

D. View of the database

What is the correct answer?

4

Benefit of database normalization is

A. smaller number of tables

B. higher query processing efficiency

C. reduced I/O for most queries

D. reduced data redundancy