4NF stands for ..
A) Fourth Normal File
B) Fourth Normal Form
C) Fourth Normal Fraction
D) Fourth Negative File

1 Answer

Answer :

B) Fourth Normal Form

Related questions

Description : Which normal form is considered as adequate for usual database design? (A) 2NF (B) 3NF (C) 4NF (D) 5NF

Last Answer : (B) 3NF

Description : A .................. normal form normalization will be needed where all attributes in a relation tuple are not functionally dependent only on the key attribute. A) First B) Second C) Third D) Fourth

Last Answer : C) Third

Description : In the ........... normal form, a composite attribute is converted to individual attributes. A) First B) Second C) Third D) Fourth

Last Answer : A) First

Description : The main task carried out in the …………… is to remove repeating attributes to separate tables. A) First Normal Form B) Second Normal Form C) Third Normal Form D) Fourth Normal Form

Last Answer : D) Fourth Normal Form

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : DFD stands for A) Data Flow Document B) Data File Diagram C) Data Flow Diagram D) Non of the above

Last Answer : C) Data Flow Diagram

Description : FTP stands for A) Folder Transfer Protocol B) File Transfer Process C) File Transfer Protocol D) File Text Protocol

Last Answer : C) File Transfer Protocol

Description : What is 4NF?

Last Answer : A relation schema R is said to be in 4NF if for every Multivalued dependency X Y that holds over R, one of following is true ∙ X is subset or equal to (or

Description : In ............. generation of operating system, operating system designers develop the concept of multiprogramming in which several jobs are in main memory at once. A) First B) Second C) Third D) Fourth

Last Answer : C) Third

Description : If an attribute of a composite key is dependent on an attribute of the other composite key, a normalization called ................ is needed. A) DKNF B) BCNF C) Fourth D) Third

Last Answer : B) BCNF

Description : DDS stands for ………………… A) Data Data Systems B) Data Digital System C) Data Dictionary Systems D) Digital Data Service

Last Answer : C) Data Dictionary Systems

Description : MDP stands for A) Master Development Plan B) Master Design Program C) Mandatory Database Program D) Master Database Plan

Last Answer : A) Master Development Plan

Description : DLC stands for A) System Development Life Cycle B) Structure Design Life Cycle C) System Design Life Cycle D) Structure development Life Cycle

Last Answer : A) System Development Life Cycle

Description : DCL stands for A) Data Control Language B) Data Console Language C) Data Console Level D) Data Control Level

Last Answer : C) Data Console Level

Description : HSAM stands for ………. A) Hierarchic Sequential Access Method B) Hierarchic Standard Access Method C) Hierarchic Sequential and Method D) Hierarchic Standard and Method

Last Answer : A) Hierarchic Sequential Access Method

Description : FDDI stands for A) Fiber Distributed Data Interface B) Fiber Data Distributed Interface C) Fiber Dual Distributed Interface D) Fiber Distributed Data Interface

Last Answer : A) Fiber Distributed Data Interface

Description : PEG stands for ............... A) Joint Photo Experts Group B) Joint Photogenic Experts Group C) Joint Photographic Experts Group D) Joint Photoelectric Experts Group

Last Answer : C) Joint Photographic Experts Group

Description : SMTP stands for A) Simple Mail Transfer Protocol B) Simple Mail Transport Protocol C) Sample Mail Transfer Protocol D) Sample Mail Transport Protocol

Last Answer : A) Simple Mail Transfer Protocol

Description : HTML stands for A) Hypertext Mass up language B) Hypertext Markup language C) Hypertext Move up language D) Hypertext Mark of language

Last Answer : B) Hypertext Markup language

Description : CAI stands for ................ A) Computer Aided Instruction B) Computer Aided information C) Cost Added Information D) Computer Aided Infrastructure

Last Answer : B) Computer Aided information

Description : COCOMO stands for (A) COmposite COst MOdel (B) COnstructive COst MOdel (C) COnstructive COmposite MOdel (D) COmprehensive COnstruction MOdel

Last Answer : (B) COnstructive COst MOdel Explanation: The Constructive Cost Model (COCOMO) is an algorithmic software cost estimation model.

Description : Specialization Lattice stands for (A) An entity type can participate as a subclass in only one specialization. (B) An entity type can participate as a subclass in more than one specialization. ... can participate in one specialization. (D) An entity type that can participate in one generalization.

Last Answer : (B) An entity type can participate as a subclass in more than one specialization.

Description : Which command is used to display a file contents in octal form? A. cd B. od C. of D. oct E. None of the above

Last Answer : B. od

Description : Binary code "0" means ............ A) State of absence B) State of presence C) State of Negative D) State of Positive

Last Answer : B) State of presence

Description : If n and r are non-negative integers and n≥r, then p(n + 1, r) equals to (A) P(n,r)(n+1) / (n+1-r) (B) P(n,r)(n+1) / (n-1+r) (C) p(n,r)(n-1) / (n+1-r) (D) p(n,r)(n+1) / (n+1+r)

Last Answer : (A) P(n,r)(n+1) / (n+1-r)  Explanation: p(n, r) = n!/(n-r)! p( n+1, r) = (n+1)!/(n+1-r)! = (n+1) n! /(n+1-r) (n-r)! = P(n, r)(n+1)/(n+1-r)

Description : Let f(n) and g(n) be asymptotically non-negative functions. Which of the following is correct? (A) θ(f(n) * g(n)) = min(f(n), g(n)) (B) θ(f(n) * g(n)) = max(f(n), g(n)) (C) θ(f(n) + g(n)) = min(f(n), g(n)) (D) θ(f(n) + g(n)) = max(f(n), g(n))

Last Answer : (D) θ(f(n) + g(n)) = max(f(n), g(n))

Description : A horn clause is ...................... (A) A clause in which no variables occur in the expression (B) A clause that has at least one negative literal (C) A disjunction of a number of literals (D) A clause that has at most one positive literal

Last Answer : (D) A clause that has at most one positive literal 

Description : Which of the following is/are not true? (a) The set of negative integers is countable. (b) The set of integers that are multiples of 7 is countable. (c) The set of even integers is countable. (d) The set of real numbers between 0 ... . (A) (a) and (c) (B) (b) and (d) (C) (b) only (D) (d) only

Last Answer : (D) (d) only

Description : There are three processes P1, P2 and P3 sharing a semaphore for synchronising a variable. Initial value of semaphore is one. Assume that negative value of semaphore tells us how many processes are waiting in queue. Processes access ... The final value of semaphore will be: (1) 0 (2) 1 (3) -1 (4) -2 

Last Answer : Answer: 1

Description : What is the difference between a sequential file and a random file?

Last Answer : Ans: Sequential file access is the method employed in tape drives where the files are access in a sequential manner. So if you have to get a file in the end of the tape you have to start ... Disks and Optical drives, wherever the files is placed it will go to that particular place and retrieve it.

Description : What do you mean by File Positioning?

Last Answer : Ans: The file positioning of a stream describes where in the file the stream is currently reading or writing. I/O on the stream advances the file position through the file. On GNU systems, the ... position is represented as an integer, which counts the number of bytes from the beginning of the file.

Description : Write the general formats for file opening and file closing commands?

Last Answer : Ans: For Opening:- fp=fopen(“filename” , “mode”); where ‘fp’ refers to the file pointer. ‘filename’ refers to the name of the file to be opened. ‘mode’ refers to the mode of accessing data. For Closing:- fclose(fp); where fp denotes the file pointer.

Description : In what way is a file more flexible than a String?

Last Answer : Ans: A file is stored permanently in a storage device.It is easy to access a file whenever required. On the other hand, a string is stored temporarily in RAM, and the contents of a string will be erased automatically when the power is switched off or when the program execution is terminated.

Description : List some of the most used File Processing functions in C?

Last Answer : Ans: Most used file processing functions in C are-  fopen()-used to open a file and set the file pointer to the beginning or end of a File.  fclose()-used to close an active File.  getc()-used ... used to write data to a File.  rewind()-used to move the file pointer to the beginning of a File.

Description : Why we use File Handling?

Last Answer : Ans: The input and output operation that we have performed so far were done through screen and keyboard only.After the termination of program all the entered data is lost because primary memory is volatile ... 2. Low level (system oriented files)- low level files handling is managed by system call.

Description : What do you mean by a File?

Last Answer : Ans: A File contains containsdata/information which are stored permanently in a storage device.Floppy disk and hard disk are commonly used to store file information.When large quantity data is required to ... filename normally has a primary name and a secondary name which are separated by a Dot(.)

Description : Which command is used to count just the number of characters in a file? A. wc - 1 B. wc -c C. wc -w D. wc -r E. None of the above

Last Answer : B. wc -c

Description : Which of the following commands is used to update access and modification times of a file? A. grep B. wc C. touch D. cat E. None of the above

Last Answer : C. touch

Description : Which command is used to remove a file? A. remove B. rm C. mv D. del E. None of the above

Last Answer : B. rm

Description : The command which transcribes the standard input to the standard output and also makes a copy of the same in a file is A. tee B. tr C. sort D. grep E. None of the above

Last Answer : A. tee

Description : The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: A. 000 B. 755 C. 744 D. 555 E. None of the above

Last Answer : B. 755

Description : Which command is used to remove the read permission of the file 'note' from both the group and others? A. chmod go+r note B. chmod go+rw note C. chmod go-x note D. chmod go-r, 4-x note E. None of the above

Last Answer : D. chmod go-r, 4-x note

Description : Which command sends the word count of the file infile to the newfile. A. wc infile >newfile B. wc newfile C. wc infile - newfile D. wc infile | newfile E. None of the above

Last Answer : A. wc infile >newfile

Description : Which command is used to extract specific columns from the file? A. cat B. cut C. grep D. paste E. None of the above

Last Answer : B. cut

Description : Which command is used to display the top of the file? A. cat B. head C. more D. grep E. None of the above

Last Answer : B. head

Description : Which command is used to sort the lines of data in a file in reverse order A. sort B. sh C. st D. sort -r E. None of the above

Last Answer : D. sort -r

Description : MS-SQL stores data in a ........................ file format. A) .DAT B) .MDB C) .MSSQL D) .OBJ

Last Answer : A) .DAT

Description : The jdb is used to A) Create a jar archive B) Debug a java program C) Create C header file D) Generate java documentation

Last Answer : B) Debug a java program

Description : File management function of the operating system includes i) File creation and deletion ii) Disk scheduling iii) Directory creation iv) Mapping file in secondary storage. A) i, ii and iii only B) i, iii and iv only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : B) i, iii and iv only

Description : Which of the following information not included in memory table? A) The allocation of main memory to process. B) The allocation of secondary memory to process C) Any information needed to manage virtual memory D) Any information about the existence of file

Last Answer : D) Any information about the existence of file