Database Administration Questions


Q:

The Basic Architecture of Computer was developed by

A) Charles Babbage B) Blaise Pascal
C) Garden Moore D) John Von Neumann
 
Answer & Explanation Answer: D) John Von Neumann

Explanation:

Computer Architecture refers to how a computer system is designed and what technologies it is compatible with. In brief, Computer architecture is a specification detailing how a set of software and hardware technology standards interact to form a computer system or platform.  

                                     comp1518074667.jpg image 

The Von Neumann Architecture, which is also known as the Von Neumann Model and Princeton architecture, is a computer architecture based on the 1945 description of computer by the mathematician and physicist John von Neumann.

Report Error

View Answer Report Error Discuss

19 13332
Q:

O_er_t_o_

Complete the missing letters of the given word.

A) Ordination B) Oterration
C) Ovvulation D) Operation
 
Answer & Explanation Answer: D) Operation

Explanation:
Report Error

View Answer Report Error Discuss

16 13084
Q:

Which of the following is Not an Operating System?

A) UNIX B) Windows NT
C) C++ D) DOS
 
Answer & Explanation Answer: C) C++

Explanation:

C++ is not an Operating System.

 

An Operating System is a collection of system programs that manages all the other programs application programs in a computer as well as the allocation and use of hardware resources such as the CPU, Memory and the Hard Disk Drive.

It acts as an interface between the hardware and the user level program.

It controls and facilitates the overall operation of a computer. 

 

Here

UNIX : UNIX is a popular multi-user, multitasking operating system (OS) developed at Bell Labs.

 

Windows NT : Windows NT is a family of operating systems produced by Microsoft, the first version of which was released in July 1993.

 

DOS : DOS is Disk Operating System. The term DOS can refer to any operating system.

 

C++ : C++ is a programming language and computing platform.

 

Hence, C++ is not an Operating System.

Report Error

View Answer Report Error Discuss

46 13063
Q:

Which dml command is used in conjunction with @@identity?

A) INSERT and UPDATE B) UPDATE and DELETE
C) SCOPE_IDENTITY and IDENT_CURRENT D) Commit and rollback
 
Answer & Explanation Answer: C) SCOPE_IDENTITY and IDENT_CURRENT

Explanation:

Using automatically incrementing IDENTITY columns is very popular with database developers. You don’t need to explicitly calculate unique surrogate keys when inserting new data, the IDENTITY column functionality does that for you. The IDENTITY feature also allows you to specify useful Seed and Increment properties. When you use an INSERT statement to insert data into a table with an IDENTITY column defined, SQL Server will generate a new IDENTITY value.

 

You can use the @@IDENTITY variable and the SCOPE_IDENTITY and IDENT_CURRENT functions to return the last IDENTITY value that has been generated by SQL Server. This is very useful when you need to return the key for the row that has just been inserted, back to the caller.

Report Error

View Answer Report Error Discuss

20 12892
Q:

Pen is to poet as needle is to

A) Sewing B) Thread
C) Tailor D) Button
 
Answer & Explanation Answer: C) Tailor

Explanation:

Here Pen is a tool which is used to write and poet uses it. Then, the needle is a tool which is used to stitch and it is used by Tailor. Except tailor, none of the other options is a person to use it.

 

Hence, Pen : Poet :: Needle : Tailor

Report Error

View Answer Report Error Discuss

Filed Under: Analogy
Exam Prep: AIEEE , Bank Exams , CAT , GATE , GRE
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration , IT Trainer

8 12682
Q:

The common name for the crime of stealing passwords is

A) Spoofing B) Surfing
C) Identity Theft D) Speeling
 
Answer & Explanation Answer: A) Spoofing

Explanation:

A spoofing attack is a situation in which one individual or program effectively disguises or mask as another by falsifying information and thereby gaining up an ill-conceived advantage. It may use for stealing password or IP addresses.

Report Error

View Answer Report Error Discuss

18 12658
Q:

Blotting paper absorbs ink due to

A) Capillary action phenomenon B) Diffusion of ink through the blotting
C) Siphon action D) Viscosity of ink
 
Answer & Explanation Answer: A) Capillary action phenomenon

Explanation:

Blotting paper absorbs ink by the process of capillary action. The capillary action is based on the property of surface tension of liquid.

 

All unsized paper will absorb water. Blotting paper is not sized and made bulkier to provide capillary action for faster absorption of liquid.

 

Blotting paper has also been sold as a cosmetic to aid in the removal of skin oils and makeup.

Report Error

View Answer Report Error Discuss

Filed Under: Physics
Exam Prep: AIEEE , Bank Exams , CAT , GATE
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration , IT Trainer

16 12490
Q:

Find the missing number in the given puzzle?

missing_number_puzzle1546602135.jpg image

A) 963 B) 696
C) 969 D) 966
 
Answer & Explanation Answer: C) 969

Explanation:

1 + 1 = 121 = 1x1 1+1 1x1

1 + 2 = 134 = 1x1 1+2 2x2

2 + 2 = 444 = 2x2 2+2 2x2

3 + 2 = 954 = 3x3 3+2 2x2

3 + 3 = ?   

Similarly, 3x3 3+3 3x3 = 969

Report Error

View Answer Report Error Discuss

40 12437