Drop Table cannot be used to drop a Table referenced by .................. constraint. (a) Primary key (b) Sub key (c) Super key (d) Foreign key (A) (a) (B) (a), (b) and (c) (C) (d) (D) (a) and (d)

1 Answer

Answer :

(C) (d)

Related questions

Description : Drop Table cannot be used to drop a table referenced by a …………… constraint. A) Local Key B) Primary Key C) Composite Key D) Foreign Key

Last Answer : D) Foreign Key

Description : A virtual memory has a page size of 1K words. There are eight pages and four blocks. The associative memory page table contains the following entries:  Which of the following list of virtual addresses (in ... 1234, 4012, 5000, 6200 (C) 1020, 3012, 6120, 8100 (D) 2021, 4050, 5112, 7100

Last Answer : Answer: C Explanation: The pages which are not in main memory are: 1020 will not cause page fault (1024-2047) 3012 will not cause page fault (3072-4095) 6120 will not cause page fault (4096-5119) 8100 will not cause page fault (6144-7167)

Description : In RDBMS, the constraint that no key attribute (column) may be NULL is referred to as: (A) Referential integrity (B) Multi-valued dependency (C) Entity Integrity (D) Functional dependency

Last Answer : (C) Entity Integrity

Description : ............. is a combination of two of more attributes used as a primary key A) Composite Key B) Alternate Key C) Candidate Key D) Foreign Key

Last Answer : A) Composite Key

Description : The candidate key is that you choose to identify each row uniquely is called …………….. A) Alternet Key B) Primary Key C) Foreign Key D) None of the above

Last Answer : B) Primary Key

Description : ey to represent relationship between tables is called (A) Primary key (B) Secondary Key (C) Foreign Key (D) None of these

Last Answer : (C) Foreign Key

Description : Which one is correct w.r.t. RDBMS? (1) primary key ⊆ super key ⊆ candidate key (2) primary key ⊆ candidate key ⊆ super key (3) super key ⊆ candidate key ⊆ primary key (4) super key ⊆ primary key ⊆ candidate key

Last Answer : Answer: 2

Description : Consider the following database table : Create table test( one integer, two integer, primary key(one), unique(two), check(one≥1 and ≤10), check(two≥1 and ≤5) ); How many data records/tuples atmost can this table contain ?  (A) 5 (B) 10 (C) 15 (D) 50

Last Answer : (A) 5 

Description : In a relational database model, NULL values can be used for all but which one of the following? (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL. (B) To ... D) To fill a column in a tuple when that column does not really exist for that particular tuple.

Last Answer : (A) To allow duplicate tuples in the table by filling the primary key column(s) with NULL.

Description : What are the Referential actions supported by FOREIGN KEY integrity constraint ?

Last Answer : UPDATE and DELETE Restrict - A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade - When a referenced row is deleted all associated dependent rows are deleted.

Description : What are the Referential actions supported by FOREIGN KEY integrity constraint?

Last Answer : UPDATE and DELETE Restrict – A referential integrity rule that disallows the update or deletion of referenced data. DELETE Cascade – When a referenced row is deleted all associated dependent rows are deleted.

Description : Write any one similarity and one difference between primary key and unique Constraint. -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : Write any one similarity and one difference between primary key and unique Constraint -Technology

Last Answer : Similarity: Column with both the constraints will only take unique values.Difference: Column with Primary key constraints will not be able to hold NULL values while Column with Unique constraints will be able to hold NULL values.

Description : What is difference between UNIQUE constraint and PRIMARY KEY constraint ?

Last Answer : A column defined as UNIQUE can contain Nulls while a column defined as PRIMARY KEY can't contain Nulls.

Description : What is difference between UNIQUE constraint and PRIMARY KEY constraint?

Last Answer : A column defined as UNIQUE can contain Nulls while a column defined as PRIMARY KEY can’t contain Nulls. 47.What is Index Cluster? – A Cluster with an index on the Cluster Key 48.When does a Transaction end? – When it is committed or Rollbacked.

Description : A foreign key is a primary key in another table. -Technology

Last Answer : True When a table’s primary key field is added to a related table in order to create the common field which relates two tables, it is called a foreign key in the related table.

Description : An attribute that uniquely identifies the rows of a table is known as the ....... key. (1) primary (2) candidate (3) composite (4) foreign 

Last Answer : primary

Description : . ………………… is a special type of integrity constraint that relates two relations & maintains consistency across the relations. A) Entity Integrity Constraints B) Referential Integrity Constraints

Last Answer : B) Referential Integrity

Description : The map colouring problem can be solved using which of the following technique? (A) Means-end analysis (B) Constraint satisfaction (C) AO* search (D) Breadth first search

Last Answer : (B) Constraint satisfaction

Description : The student marks should not be greater than 100. This is (A) Integrity constraint (B) Referential constraint (C) Over-defined constraint (D) Feasible constraint

Last Answer : (A) Integrity constraint

Description : In constraint satisfaction problem, constraints can be stated as . (A) Arithmatic equations and inequalities that bind the values of variables (B) Arithmatic equations and inequalities ... impose restrictions over variables (D) Arithmatic equations that discard constraints over the given variables

Last Answer : (A) Arithmatic equations and inequalities that bind the values of variables

Description : Based on the cardinality ratio and participation ............... associated with a relationship type, choose either the Foreign Key Design, the Cross Referencing Design or Mutual Referencing Design. (A) Entity (B) Constraints (C) Rules (D) Keys

Last Answer : (B) Constraints

Description : State true or false i) A candidate key is a minimal super key. ii) A candidate key can also refer to as surrogate key. A) i-true, ii-false B) i-false, ii-true C) i-true, ii-true D) i-false, ii-false

Last Answer : C) i-true, ii-true

Description : ………..defines the structure of a relation which consists of a fixed set of attribute-domain pairs. A) Instance B) Schema c) Program D) Super Key

Last Answer : B) Schema

Description : …………….. is the complex search criteria in the where clause. A) Substring B) Drop Table C) Predict D) Predicate

Last Answer : D) Predicate

Description : Consider the following two commands C1 and C2 on the relation R from an SQL database:  C1: drop table R; C2: delete from R; Which of the following statements is TRUE? I. Both C1 and C2 delete the schema for R. II. C2 ... R. (A) I only (B) I and II only (C) II and III only (D) I, II and III

Last Answer : (C) II and III only

Description : ................. maintains the list of free disk blocks in the Unix file system. (A) I-node (B) Boot block (C) Super block (D) File allocation table

Last Answer : (C) Super block 

Description : Which of the following statements is FALSE about weak entity set ? (A) Weak entities can be deleted automatically when their strong entity is deleted. (B) Weak entity set avoids the data ... weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Last Answer : (D) Tuples in a weak entity set are not partitioned according to their relationship with tuples in a strong entity set.

Description : Let pk(R) denotes primary key of relation R. A many-to-one relationship that exists between two relations R1 and R2 can be expressed as follows: (1) pk(R2)→pk(R1) (2) pk(R1)→pk(R2) (3) pk(R2)→R1∩R2 (4) pk(R1)→R1∩R2

Last Answer : Answer: 2

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n ≤ m, the expected number of collisions involving a particular key K is (A) less than 1 (B) less than lg n (C) greater than 1 (D) greater than lg n

Last Answer : (A) less than 1

Description : Consider a hash table of size m=100 and the hash function h(k) = floor(m(kA mod 1)) for A = (√5 − 1)/2 = 0.618033. Compute the location to which the key k = 123456 is placed in hash table. (A) 77 (B) 82 (C) 88 (D) 89

Last Answer : (C) 88

Description : The Unix Kernel maintains two key data structures related to processes, the process table and the user structure. Which of following information is not the part of user structure? (A) File descriptor table (B) System call state (C) Scheduling parameters (D) Kernel stack

Last Answer : (C) Scheduling parameters

Description : Consider the following database table having A, B, C and D as its four attributes and four possible candidate keys (I, II, III and IV) for this table: I: {B} II: {B, C} III: {A, D} IV: {C, D} If ... the database table? (A) I and III only (B) III and IV only (C) II only (D) I only

Last Answer : (C) II only

Description : If h is chosen from a universal collection of hash functions and is used to hash n keys into a table of size m, where n≤m, the expected number of collisions involving a particular key x is less than ................... (1) 1 (2) 1/n (3) 1/m (4) n/m

Last Answer : Answer: 1

Description : Which can be used to delete all the rows if a table? A) Delete * from table_name B) Delete from table_name C) Delete table_name D) all rows cannot be deleted at a time.

Last Answer : A) Delete * from table_name

Description : If an unique key constraint on DATE column is created, will it validate the rows that are inserted with SYSDATE ?

Last Answer : It won't, Because SYSDATE format contains time attached with it.

Description : What are the key components in the "Triple constraint Triangle"?  A. Scope, Schedule, Cost, Project Manager B. Scope, Time, Cost, Project (Ans.) C. Time, Money, Scope, Project D. Project Manager, Time, Scope, Money

Last Answer : B. Scope, Time, Cost, Project (Ans.)

Description : Can you call a stored function in the constraint of a table ?

Last Answer : no

Description : Is it more profitable for Company M to produce Q? I. Product R sells at a price four times that of Q II. One unit of Q requires 2 units of labour, while one unit of R requires 5 ... both the statements. If the data in either statement I or statement II alone is sufficient to answer the question

Last Answer : from statement I : Let the price of product Q be P' Then the price of product R is 4P From Statement II: Cost of product Q =2 Cost of product R=5 Therefore, Profit percentage of product ... )=80P-100 Hence, product R is more profitable. Both statements are required to answer the question Answer :c

Description : Is it more profitable for Company M to produce Q? I. Product R sells at a price four times that of Q II. One unit of Q requires 2 units of labour, while one unit of R requires 5 ... both the statements. If the data in either statement I or statement II alone is sufficient to answer the question

Last Answer : from statement I : Let the price of product Q be P' Then the price of product R is 4P From Statement II: Cost of product Q =2 Cost of product R=5 Therefore, Profit percentage of product ... )=80P-100 Hence, product R is more profitable. Both statements are required to answer the question Answer :c

Description : Which of the following statement is true? (1) A Primary key is also a candidate key (2) Each relation has at least one foreign key (3) Foreign keys can’t have null values (4) A Primary key is also an alternate key

Last Answer : Foreign keys can’t have null values

Description : A foreign key is a reference of the ………….. key in another table. -Technology

Last Answer : A foreign key is a reference of the primary keyin another table.

Description : The................. layer is responsible for resolving access to the shared media or resources. A) Physical B) Mac sub layer C) Network D) Transport

Last Answer : B) Mac sub layer

Description : Inner classes are A) anonymous classes B) nested classes C) sub classe

Last Answer : B) nested classes

Description : The …………….. policy segments the disks request queue into sub queues of the length N. A) SCAN B) C-SCAN C) N-Step SCAN D) FSCAN

Last Answer : C) N-Step SCAN