The full form of DDL is
(A Dynamic Data Language (B) Detailed Data Language
(C) Data Definition Language (D) Data Derivation Language

1 Answer

Answer :

C) Data Definition Language

Related questions

Description : What is DDL (Data Definition Language)?

Last Answer : A data base schema is specifies by a set of definitions expressed by a special language called DDL.

Description : DBMS provides the facility of accessing data from a database through (A) DDL (B) DML (C) DBA (D) Schema 

Last Answer : (B) DML

Description : First operation during the detailed survey of a hill road, is (A) Hydrological and soil surveys (B) Adjustment of alignment along with curves (C) Derivation of longitudinal and cross-sections (D) Fixation of Bench Marks

Last Answer : Answer: Option D

Description : Given a grammar : S1→Sc, S→SA|A, A→aSb|ab, there is a rightmost derivation S1=>Sc =>SAC=>SaSbc. Thus, SaSbc is a right sentential form, and its handle is (A) SaS (B) be (C) Sbe (D) aSb 

Last Answer : (D) aSb

Description : Which of the following is/are the DDL statements? A) Create B) Drop C) Alter D) All of the above

Last Answer : D) All of the above

Description : Anything that affects the database schema is a part of A) DML B) DCL C) DDL D) All of the above

Last Answer : D) All of the above

Description : The database schema is written in (A) HLL (B) DML (C) DDL (D) DCL

Last Answer : (C) DDL

Description : Which of the following derivations does a top-down parser use while parsing an input string ? The input is scanned from left to right. (A) Leftmost derivation (B) Leftmost derivation traced out in reverse (C) Rightmost derivation traced out in reverse (D) Rightmost derivation

Last Answer : (A) Leftmost derivation

Description : In XML, DOCTYPE declaration specifies to include a reference to ............ file. (A) Document Type Definition (B) Document Type Declaration (C) Document Transfer Definition (D) Document Type language

Last Answer : (A) Document Type Definition

Description : The friend functions are used in situations where A) We want to exchange data between classes B) We want to have access to unrelated classes C) Dynamic binding is required D) We want to create versatile overloaded operators.

Last Answer : A) We want to exchange data between classes

Description : Which of the following concepts means adding new concepts to a program as it runs? (A) Data hiding (B) Dynamic loading (C) Dynamic typing (D) Dynamic binding

Last Answer : (B) Dynamic loading

Description : A context diagram is used A) as the first step in developing a detailed DFD of a system B) in systems analysis of very complex systems C) as an aid to system design D) as an aid to programmer

Last Answer : A) as the first step in developing a detailed DFD of a system

Description : A context diagram A) Describes the context of a system B) is a DFD which gives an overview of the system C) is a detailed description of a system D) is not used in drawing a detailed DFD

Last Answer : B) is a DFD which gives an overview of the system

Description : Write the full forms of the following: (i) DDL (ii) DML -Technology

Last Answer : (i) DDL-Data Definition Language(ii) DML-Data Manipulation Language

Description : Derivation of Thiem's formula Q = 2 (s1 - s2)/2.3 log10 (r2/r1) is based on the assumption  (A) The aquifer is homogeneous, isotropic and of infinite depth and area  (B) The well is sunk ... (C) The flow lines are radial and horizontal, and the flow is laminar  (D) All the above 

Last Answer : (D) All the above 

Description : Java servlets are an efficient and powerful solution for creating ………….. for the web. A) Dynamic content B) Static content C) Hardware D) Both a and b

Last Answer : A) Dynamic content

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : B) Static allocation

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet protocol(IP) ii) Internet control Message Protocol(ICMP) iii) Bootstrap Protocol (BooTP) iv) Dynamic Host Configuration Protocol (DHCP) v) ... C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : ………………….. implies that all subnets obtained from the same subnet mask. A) Static subnetting B) Dynamic subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : Which of the following is not a mechanism that DHCP supports for IP address allocation? A) Automatic allocation B) Static allocation C) Dynamic allocation D) Manual allocation

Last Answer : A) Automatic allocation

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : ........ implies that all subnets obtained from the same network use the subnet mask. A) Static subnetting B) Dynamic Subnetting C) Variable length subnetting D) Both B and C

Last Answer : A) Static subnetting

Description : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method

Last Answer : Which of the following algorithm design technique is used in the quick sort algorithm? a) Dynamic programming b) Backtracking c) Divide-and-conquer d) Greedy method

Description : In windows 2000 operating system all the processor-dependent code is isolated in a dynamic link library called (A) NTFS file system (B) Hardware abstraction layer (C) Microkernel (D) Process Manager

Last Answer : (B) Hardware abstraction layer

Description : C++ actually supports the following two complete dynamic allocation systems: (A) One defined by C++ and the other not defined by C. (B) One defined by C and one specific to C++. (C) Both are specific to C++ (D) Both of them are improvements of C.

Last Answer : (B) One defined by C and one specific to C++. 

Description : Which of the following differentiates between overloaded functions and overridden functions ? (A) Overloading is a dynamic or runtime binding and overridden is a static or compile time binding. ... function overloading, while redefining a function in a friend class is called function overriding.

Last Answer : (B) Overloading is a static or compile time binding and overriding is dynamic or runtime binding.

Description : Which of the following statements is true for Branch-and-Bound search? (A) Underestimates of remaining distance may cause deviation from optimal path. (B) Overestimates can't cause right path to be ... Dynamic programming principle can be used to discard redundant partial paths. (D) All of the above

Last Answer : (C) Dynamic programming principle can be used to discard redundant partial paths.

Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process 

Last Answer : (C) It is a chip to map virtual address to physical address

Description : The travelling salesman problem can be solved in: (A) Polynomial time using dynamic programming algorithm (B) Polynomial time using branch-and-bound algorithm (C) Exponential time using dynamic programming algorithm or branch-andbound algorithm. (D) Polynomial time using backtracking algorithm.

Last Answer : (C) Exponential time using dynamic programming algorithm or branch-andbound algorithm.

Description : The translator which performs macro calls expansion is called : (A) Macro processor (B) Micro pre-processor (C) Macro pre-processor (D) Dynamic linker

Last Answer : (C) Macro pre-processor 

Description : A dynamic RAM has refresh cycle of 32 times per msec. Each refresh operation requires 100 nsec and a memory cycle requires 250 nsec. What percentage of memory’s total operating time is required for refreshes? (A) 0.64 (B) 0.96 (C) 2.00 (D) 0.32

Last Answer : Answer: D Explanation: in 1ms : refresh = 32 times Memory cycle = 1ms/250ns = 106ns/250ns = 4000 times Therefore, % of refresh time = (32 x 100ns)/(4000 x 250ns) = 3200ns/1000000 x 100% = 0.32%

Description : Match the following types of variables with the corresponding programming languages: (a) Static variables (i) Local variables in Pascal (b) Stack dynamic (ii) All variables in APL (c) Explicit heap dynamic (iii) Fortran 77 (d) Implicit ... (ii) (C) (iii) (i) (iv) (ii) (D) (ii) (i) (iii) (iv)

Last Answer : (C) (iii) (i) (iv) (ii) 

Description : Which of the following is not typically a benefit of dynamic linking? I. Reduction in overall program execution time. II. Reduction in overall space consumption in memory. III. Reduction in overall space consumption on disk. IV. ... updates. (A) I and IV (B) I only (C) II and III (D) IV only

Last Answer : (B) I only 

Description : Dijkstra’s algorithm is based on (1) Divide and conquer paradigm (2) Dynamic Programming (3) Greedy Approach (4) Backtracking paradigm

Last Answer : 3

Description : Red-black trees are one of many Search tree schemes that are "balanced” in order to guarantee that basic dynamic-set operations take ............. time in the worst case. (1) O(1) (2) O(log n) (3) O(n) (4) O(n log n)

Last Answer : (2) O(log n) 

Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database

Last Answer : Answer: 3

Description : Which of the following statements is false? (A) Optimal binary search tree construction can be performed efficiently using dynamic programming. (B) Breadth-first search cannot be used to find connected components of a graph. (C) ... used to find the components of a graph. (1) A (2) B (3) C (4) D 

Last Answer : Answer: 2

Description : Give two methods you could use to determine what DDL changes have been made.

Last Answer : You could use Logminer or Streams

Description : Can you issue DDL in forms?

Last Answer : yes, but you have to use FORMS_DDL. Referencing allows you to create objects that inherit their functionality and appearance from other objects. Referencing an object is similar to copying an ... values of bind variables can be concatenated into the string before passing the result to FORMS_DDL.

Description : How could you execute DDL commands, such as ALTER or CREATE TABLE, against a database with ADO.NET?

Last Answer : You must use a Command object to execute DDL commands. You can set the CommandType property to Text and enter the appropriate DDL command in the CommandText property. Then call Command.ExecuteNonQuery to execute the command.

Description : What is DDL Interpreter?

Last Answer : It interprets DDL statements and record them in tables containing metadata.

Description : Say two examples of DML, two of DCL and two of DDL

Last Answer : Say two examples of DML, two of DCL and two of DDL

Description : Hello, could anyone please advise me how to derive a small t possibly M? the formula is T = M * t / 100. Thank you in advance

Last Answer : I probably don't understand t = 100 * T / MM = 100 * T / t

Description : What is the Latin derivation of the word culina?

Last Answer : What is the answer ?

Description : Out of the following four assumptions used in the derivation of theequation for LMTD [LMTD = (∆t1 - ∆t2 )/ln(∆t1 /∆t2 )], which one is subject to the largest deviation in practice ? (A) Constant ... (B) Constant rate of fluid flow (C) Constant specific heat (D) No partial phase change in the system

Last Answer : (B) Constant rate of fluid flow

Description : Bernoulli's equation for fluid flow is derived following certain assumptions. Out of the assumptions listed below, which set of assumptions is used in derivation of Bernoulli's equation? A. Fluid flow is frictionless & irrotational. B. Fluid flow is ... A, C, D (B) B, D, E (C) A, B, E (D) A, D, E

Last Answer : (C) A, B, E

Description : the derivation of Thiem's formula, Q = (S1 - S2)/[2.3 log10( / )] the following assumption is not applicable (A) The aquifer is homogeneous and isotropic (B) Flow lines are radial and ... the water surface is too small (D) The well has been sunk up to the surface of the unconfined aquifer

Last Answer : Answer: Option D

Description : Which of the following is not an assumption in derivation of torsion equation? a. Circular shaft remains circular after twisting b. Plane section of the shaft remain plane after twisting c. Material of shaft is isotropic d. Angle of twist is proportional to radius

Last Answer : d. Angle of twist is proportional to radius

Description : Soils in the Mahanadi delta are less fertile than those in the Godavari delta because of: (A) erosion of top soils by annual floods (B) inundation of land by sea water (C) traditional agriculture practices (D) the derivation of alluvial soil from red-soil hinterland

Last Answer : Answer: A  The Mahanadi was notorious for its devastating floods for much of recorded history. Thus it was called 'the sorrow of Orissa'. However the construction of the Hirakud Dam has greatly ... matter of great concern. Indiscriminate damming along the river has been cited as an obvious reason.