CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Database Systems
Comments
Question
Versatile report generators can provide
Options
A. Columnar totals
B. Subtotals
C. Calculations
D. All of the above
E. None of the above
Correct Answer
All of the above
Database Systems problems
Search Results
1. In SQL, which command is used to remove a stored function from the database?
Options
A. REMOVE FUNCTION
B. DELETE FUNCTION
C. DROP FUNCTION
D. ERASE FUNCTION
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: DROP FUNCTION
2. One approach to standardizing storing of data
Options
A. MIS
B. structured programming
C. CODASYL specifications
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: CODASYL specifications
3. Which command is used to select distinct subject (SUB) from the table (BOOK)?
Options
A. SELECT ALL FROM BOOK
B. SELECT DISTINCT SUB FROM BOOK
C. SELECT SUB FROM BOOK
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: SELECT DISTINCT SUB FROM BOOK
4. The physical location of a record is determined by a mathematical formula that transforms a file key into a record location in
Options
A. a tree file
B. an indexed file
C. a hashed file
D. a sequential file
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: a hashed file
5. In SQL, the CREATE TABLE is used
Options
A. to create a table, defining its columns, integrity constrains, and storage allocation
B. to add a column/integrity constraint to a table
C. to redefine a column
D. to change a table's storage characteristics
E. All of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: to create a table, defining its columns, integrity constrains, and storage allocation
6. The modify operation is likely to be done after
Options
A. Delete
B. Look-up
C. Insert
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: Look-up
7. What software packages are commonly used for businesses that have to track extensive lists of clients and inventory?
Options
A. Special purpose packages
B. Custom made programs
C. Single function application packages
D. Data management packages
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: Data management packages
8. The _____ command is used to allocates an extent for the table in SQL
Options
A. MODIFY ALLOCATES
B. MODIFY TABLE
C. ALTER TABLE
D. REDEFINE TABLE
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: MODIFY ALLOCATES
9. Data encryption techniques are particularly useful for
Options
A. reducing storage space requirements
B. improving data integrity
C. protecting data in data communication systems
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: protecting data in data communication systems
10. In order to use a record management system
Options
A. You need to understand the low-level details of how information in stored
B. You need to understand the model the record management system uses.
C. Both (a) and (b)
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: You need to understand the model the record management system uses.
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT