............ is a special type of stored procedure that is automatically invoked whenever the data in  the table is modified.
A) Procedure
B) Trigger
C) Curser
D) None of the above

1 Answer

Answer :

B) Trigger

Related questions

Description : ................ allows individual row operation to be performed on a given result set or on the generated by a selected by a selected statement. A) Procedure B) Trigger C) Curser D) None of above

Last Answer : C) Curser

Description : Which of the following characteristics of constructor are true. i) They should be declared in the public section. ii) They are invoked automatically when the objects are created. iii) They do not have return type and void also. ... and v C) Only i, iii, iv and v D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : Which of the following statement is not correct with reference to cron daemon in UNIX O.S? (A) The cron daemon is the standard tool for running commands on a predetermined schedule. (B) It starts ... command lines and the times at which they invoked. (D) Crontab for individual users are not stored.

Last Answer : (D) Crontab for individual users are not stored.

Description : ………………… is preferred method for enforcing data integrity A) Constraints B) Stored Procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : ……………. is a preferred method for enforcing data integrity A) Constraints B) Stored procedure C) Triggers D) Cursors

Last Answer : A) Constraints

Description : What is the advantage of a stored procedure over a database trigger ?

Last Answer : We have control over the firing of a stored procedure but we have no control over the firing of a trigger.

Description : The document that is used by XSLT to indicate, how to transform the elements of the XML document to another format is (A) HTML page (B) DOC type procedure (C) Style sheet (D) Stored procedure

Last Answer : (C) Style sheet

Description : An actor in an animation is a small program invoked ............... per frame to determine the characteristics of some object in the animation. (A) once (B) twice (C) 30 times (D) 60 times

Last Answer : (A) once

Description : System calls are usually invoked by using: (A) A privileged instruction (B) An indirect jump (C) A software interrupt (D) Polling

Last Answer : (C) A software interrupt

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : In a demand paging memory system, page table is held in registers. The time taken to service a page fault is 8 m.sec. if an empty frame is available or if the replaced page is not modified, and it takes 20 m.secs., if the replaced ... ? (A) 11.6 m.sec. (B) 16.4 m.sec. (C) 28 m.sec. (D) 14 m.sec.

Last Answer : (B) 16.4 m.sec. 

Description : Consider the following statements: (a) Revised simplex method requires lesser computations than the simplex method. (b) Revised simplex method automatically generates the inverse of the current basis matrix. (c) Less number of entries are needed ... c) only (C) (b) and (c) only (D) (a), (b) and (c)

Last Answer : (D) (a), (b) and (c)

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : ……………….. contains information that defines valid values that are stored in a column or data type. A) View B) Rule C) Index D) Default

Last Answer : C) Index

Description : In the illustration, the tan and white wires are connected to the solenoid valve. The solinoid valve is_________. EL-0043 A. in the liquid line before the TXV B. energized and open whenever the unit ... so the unit must be modified before using aboard ship D. the water inlet for the ice maker

Last Answer : Answer: D

Description : In the illustration, the tan and white wires are connected to the solenoid valve. The solenoid valve is_________. EL-0042 A. in the liquid line before the TXV B. energized and open whenever the unit ... so the unit must be modified before using aboard ship D. the water inlet for the ice maker

Last Answer : Answer: D

Description : A representative from Coca-Cola automatically stops by a local fast-food outlet once a month to determine how much soft-drink syrup the store will need. This is an example of which type of organisational purchase: A)new-task B)modified rebuy C)straight rebuy D)negotiated

Last Answer : C)straight rebuy

Description : …………….. mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : A CPU handles interrupt by executing interrupt service subroutine................. (A) by checking interrupt register after execution of each instruction (B) by checking interrupt register ... cycle (C) whenever an interrupt is registered (D) by checking interrupt register at regular time interval

Last Answer : (A) by checking interrupt register after execution of each instruction

Description : Suggest me an application which adds current timestamp automatically whenever I click photos with the facility to change its font size and position.?

Last Answer : Timestamp Camera is the best(maybe the only) app to automatically add timestamp to new videos in real time. Automatically insert current time and address when taking photo or video in real time, you can change time format or select the address around easily.

Description : …………… can be defined as most recent and perhaps the most comprehensive technique for solving computer problems. A) System Analysis B) System Data C) System Procedure D) System Record

Last Answer : A) System Analysis

Description : Suppose that the time to do a null remote procedure call (RPC) (i.e, 0 data bytes) is 1.0 msec, with an additional 1.5 msec for every 1K of data. How long does it take to read 32 K from the file server as 32 1K RPCs? (A) 49 msec (B) 80 msec (C) 48 msec (D) 100 msec

Last Answer : (B) 80 msec

Description : What else works to take the curser to the beginning of the text, other than/if not the Home key?

Last Answer : You can use your mouse or the arrow keys.

Description : If you're at the end of a text how do you get the curser to the beginning of the text?

Last Answer : answer:The Home key will do it, but only if you don’t have Number Lock (Num Lock) on. The End key, rather predictably, will take you to the end of your text.

Description : ………… is very useful in situation when data have to stored and then retrieved in reverse order. A) Stack B) Queue C) List D) Link list

Last Answer : A) Stack

Description : The relational model is based on the concept that data is organized and stored in two-dimensional tables called ………………………A) Fields B) Records C) Relations D) Keys

Last Answer : C) Relations

Description : A logical schema A) is the entire database B) is a standard way of organizing information into accessible parts. C) Describes how data is actually stored on disk. D) All of the above

Last Answer : B) is a standard way of organizing information into accessible parts.

Description : Serial access memories are useful in applications where (A) Data consists of numbers (B) Short access time is required. (C) Each stored word is processed differently. (D) None of these

Last Answer : (D) None of these Explanation: data naturally needs to flow in and out in serial form.

Description : For the 8-bit word 00111001, the check bits stored with it would be 0111. Suppose when the word is read from memory, the check bits are calculated to be 1101. What is the data word that was read from memory? (A) 10011001 (B) 00011001 (C) 00111000 (D) 11000110

Last Answer : (B) 00011001

Description : Which of the following information about the UNIX file system is not correct? (A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks. (B ... Each i-node is 256-bytes long. (D) All the files and directories are stored in data blocks. 

Last Answer : (C) Each i-node is 256-bytes long.

Description : Relational database schema normalization is NOT for: (A) reducing the number of joins required to satisfy a query. (B) eliminating uncontrolled redundancy of data stored in the database. (C) ... could otherwise occur with inserts and deletes. (D) ensuring that functional dependencies are enforced. 

Last Answer : reducing the number of joins required to satisfy a query.

Description : Instructions and data can be stored in the memory of Computer for automatically directing the flow of operations. It is called _____ concept. (A) Objective Programming (B) Stored program (C) Both (A) and (B) (D) None of the Above

Last Answer : (B) Stored program

Description : In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity

Last Answer : B) Integrity

Description : When the form is running in DEBUG mode, If you want to examine the values of global variables and other form variables, What package procedure command you would use in your trigger text ?

Last Answer : Break. SYSTEM VARIABLES

Description : Can we use a restricted package procedure in ON-VALIDATE-FIELD Trigger ?

Last Answer : No

Description : Which of the following malicious program do not replicate automatically? A) Trojan Horse B) Virus C) Worm D) Zombie

Last Answer : A) Trojan Horse

Description : State which statement is true for Suspended process? i) The process is not immediately available for execution. ii) The process may be removed from suspended state automatically without removal order. A) i only B) ii only C) i and ii only D) None

Last Answer : A) i only

Description : .................. allows to create classes which are derived from other classes, so that they automatically include some of its "parent's" members, plus its own members. (A) Overloading (B) Inheritance (C) Polymorphism (D) Encapsulation 

Last Answer : (B) Inheritance

Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database

Last Answer : Answer: 3

Description : The standard procedure for maintaining the charge in an emergency diesel starting battery is to trickle charge the battery _____________. A. continuously B. at least once each week C. whenever the charge falls to 75% of full charge D. whenever the electrolyte specific gravity falls to 1.250 or lower

Last Answer : Answer: A

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : In RDBMS, Data is presented as a collection of ............ A) Table B) Attributes C) Relations D) Entities

Last Answer : C) Relations

Description : The one guideline to be followed while designing the database is A) A database design may be ambiguous. B) Unrelated data should be in the same table so that updating the data will be easy. C) It should avoid/reduce the redundancy. D) An entity should not have attributes.

Last Answer : C) It should avoid/reduce the redundancy.

Description : A data file of 1,00,000 characters contains only the characters g-l, with the frequencies as indicated in table:  using the variable-length code by Huffman codes, the file can be encoded with (A) 2,52,000 bits (B) 2,64,000 bits (C) 2,46,000 bits (D) 2,24,000 bits

Last Answer : (D) 2,24,000 bits 

Description : Fact-less fact table in a data warehouse contains (A) only measures (B) only dimensions (C) keys and measures (D) only surrogate keys

Last Answer : (D) only surrogate keys

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : Consider the following three SQL queries (Assume the data in the people table) : (a) Select Name from people where Age>21; (b) Select Name from people where Height>180; (c) Select Name from people where (Age>21) or (Height ... number of rows returned by the SQL query (c) ? (A) 3 (B) 7 (C) 10 (D) 21

Last Answer : (C) 10