Database Administration Questions


Q:

What is so delicate that even mentioning it breaks it?

Answer

Silence is what is so delicate that even mentioning it breaks it.

Report Error

View answer Workspace Report Error Discuss

8 6784
Q:

Where did India play its 1st One Day International match?

A) Lords B) Headingley
C) Taunton D) The Oval
 
Answer & Explanation Answer: B) Headingley

Explanation:

India play its 1st One Day International match in cricket against England in the year 1974 in Headingley in Leeds.

Where_did_India_play_its_1st_One_Day_International_match1552388512.jpg image

Report Error

View Answer Report Error Discuss

Filed Under: Sports
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration , IT Trainer

4 6712
Q:

Which two method you need to implement for key Object in HashMap ?

Answer

In order to use any object as Key in HashMap, it must implements equals and hashcode method in Java.

Report Error

View answer Workspace Report Error Discuss

4 6669
Q:

Solve if you are Genius?

27973011_1559273064179792_7533515893130149894_n1519041289.jpg image

A) 36 B) 42
C) 48 D) 54
 
Answer & Explanation Answer: D) 54

Explanation:

Here the given Number Puzzle follows a pattern that, Sum of the numbers on the corners on the two squares is same and is equal to 54.

i.e,

13 + 15 + 14 + 12 = 54 

and

8 + 22 + 9 + 15 = 54

Report Error

View Answer Report Error Discuss

13 6652
Q:

Social engineering attacks are best identified by

A) Ransomware B) Phishing
C) Both A & B D) None of the above
 
Answer & Explanation Answer: C) Both A & B

Explanation:

Social engineering is the art of tricking users into performing certain harmful activities or attacks, users must be trained to identify social engineering. Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

 

Report Error

View Answer Report Error Discuss

1 6648
Q:

Fifth generation computer is also known as

A) Very Large Scale Integration (VLSI) B) Knowledge information processing system
C) Both A & B D) None of the above
 
Answer & Explanation Answer: B) Knowledge information processing system

Explanation:
Report Error

View Answer Report Error Discuss

13 6647
Q:

O_er_t_o_

Complete the missing letters of the given word.

A) Ordination B) Oterration
C) Ovvulation D) Operation
 
Answer & Explanation Answer: D) Operation

Explanation:
Report Error

View Answer Report Error Discuss

13 6630
Q:

Which of the following are incorrect form of StringBuffer class constructor  ?

A) StringBuffer(int size , String str) B) StringBuffer(int size)
C) StringBuffer(String str) D) StringBuffer()
 
Answer & Explanation Answer: A) StringBuffer(int size , String str)

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Java
Job Role: Database Administration , IT Trainer

3 6622