Questions

Q:

What is scientific name of " Tulsi " ?

A) Gossypium Herbaceum B) Ocimum Sanctum
C) Zea Mays D) Cojonus Cgjan
 
Answer & Explanation Answer: B) Ocimum Sanctum

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: General Science
Exam Prep: AIEEE , Bank Exams , CAT

43 8482
Q:

Which of the following is a vector quantity

A) momentum B) pressure
C) Energy D) work
 
Answer & Explanation Answer: A) momentum

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Physics

16 8479
Q:

Who was the first person to cross the Alps with army

A) Hannibal B) Napolean
C) Alexander D) None of these
 
Answer & Explanation Answer: A) Hannibal

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Famous Personalities

6 8479
Q:

Data integrity constraints are used to

A) Ensure that duplicate records are not entered into the table B) Prevent users from changing the values stored in the table
C) Control who is allowed access to the data D) Improve the quality of data entered for a specific property like table column
 
Answer & Explanation Answer: D) Improve the quality of data entered for a specific property like table column

Explanation:

Integrity constraints are used to ensure accuracy and consistency of data in a relational database. Data integrity is handled in a relational database through the concept of referential integrity. Many types of integrity constraints play a role in referential integrity (RI).

 

Hence, Data integrity constraints are used to Improve the quality of data entered for a specific property i.e, table column.

Report Error

View Answer Report Error Discuss

27 8478
Q:

When is a system in safe state?

Answer

The set of dispatchable processes is in a safe state if there exists at least one temporal order in which all processes can be run to completion without resulting in a deadlock.

Report Error

View answer Workspace Report Error Discuss

7 8477
Q:

What is cycle stealing?

Answer

We encounter cycle stealing in the context of Direct Memory Access (DMA). Either the DMA controller can use the data bus when the CPU does not need it, or it may force the CPU to temporarily suspend operation. The latter technique is called cycle stealing. Note that cycle stealing can be done only at specific break points in an instruction cycle.

Report Error

View answer Workspace Report Error Discuss

2 8471
Q:

The man who is specialist in wine making is called as ?

A) Wenologist B) Grapologist
C) Oenologist D) None
 
Answer & Explanation Answer: C) Oenologist

Explanation:

Oenology is the science and study of wine and winemaking. So person who is specialist in that is called as Oenologist.

Report Error

View Answer Report Error Discuss

Filed Under: General Science
Exam Prep: Bank Exams , CAT
Job Role: Bank Clerk , Bank PO

33 8469
Q:

Which one of the following waterfalls in india has the most height _____

A) Barchipani Falls B) Kunchikal Falls
C) Meenmutty Falls D) Jog Falls
 
Answer & Explanation Answer: B) Kunchikal Falls

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian Geography

16 8467