Database Administration Questions


Q:

IP address of a packet is normally analyzed by

A) Modem B) Router
C) Hub D) CPU
 
Answer & Explanation Answer: B) Router

Explanation:

The IP address of a packet is normally analyzed by Router.

Report Error

View Answer Report Error Discuss

6 3821
Q:

How do you make the number one disappear?

Answer

Add the letter 'G' to the word 'ONE' and it become's 'Gone' which means disappear.

Report Error

View answer Workspace Report Error Discuss

7 3804
Q:

What is a stub network?

A) A network with only one entry and no exit point. B) A network that has only one entry and exit point.
C) A network with more than one exit point. D) A network with more than one exit and entry point.
 
Answer & Explanation Answer: B) A network that has only one entry and exit point.

Explanation:

A stub network has only one default path to non-local hosts and no outside network knowledge. Non-local stub network traffic uses a single logical path when traveling in and out of the network.

 

Stub networks are essentially local area networks (LAN) that either do not connect to the outside and relay data packets internally or are dead-end LANs that know of only one network exit. Stub networks may have multiple connections but use one path to single points of destination.

 

Hence, a stub network is a network that has only one entry and exit point.

Report Error

View Answer Report Error Discuss

3 3803
Q:

Is DRAM Volatile or Nonvolatile?

Answer

DRAM is a Volatile random-access memory (VRAM).


 


Volatile random-access memory (VRAM) is random-access memory that retains its information when power is turned on.


Examples of volatile memory are primary storage (typically dynamic RAM, DRAM), and fast CPU cache memory (typically static RAM, SRAM, which is fast but energy-consuming and offer lower memory capacity per area unit than DRAM).


Non-volatile random-access memory (NVRAM) is random-access memory that retains its information when power is turned off.

Examples of non-volatile memory are flash memory (used as secondary memory) and ROM, PROM, EPROM and EEPROM memory (used for storing firmware such as BIOS). 

Report Error

View answer Workspace Report Error Discuss

10 3802
Q:

What is the distance around a shape called?

A) Volume B) Area
C) Mass D) Perimeter
 
Answer & Explanation Answer: D) Perimeter

Explanation:

The distance around a shape or figure I called Perimeter. A perimeter is a path that surrounds a two-dimensional shape.

Report Error

View Answer Report Error Discuss

3 3801
Q:

Which of these was a political goal for farmers?

A) lower prices for grain storage B) higher prices for machinery
C) lower prices for foreign goods D) higher prices for shipping
 
Answer & Explanation Answer: A) lower prices for grain storage

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Indian History
Exam Prep: AIEEE , Bank Exams , CAT
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration

6 3796
Q:

Manogna's father was 38 years of age when she was born while her mother was 36 years old when her brother, 4 years younger than her, was born. What is the difference between the ages of her parents?

A) 2 years B) 4 years
C) 6 years D) 8 years
 
Answer & Explanation Answer: C) 6 years

Explanation:

From the given data,

Manogna’s age be 0 when she was born.

Her father’s age = 38 years

Her mother’s age when Manogna’s brother who is 4 years younger to her was born = 36 years

=> Manogna’s mother age when Manogna was born = 36 - 4 = 32 years

 

Hence, the difference between the ages of Manogna’s parents = 38 - 32 = 6 years.

Report Error

View Answer Report Error Discuss

3 3774
Q:

Configuration management is not concerned with

A) maintaining versions of software B) controlling documentation changes
C) controlling changes to the source code D) choice of hardware configuration for an application
 
Answer & Explanation Answer: D) choice of hardware configuration for an application

Explanation:

Configuration management is not concerned with the choice of the hardware configuration for an application.

 

Configuration management is concerned with the development of procedures and standards for cost-effective managing and controlling charges in an evolving s/w system.

It includes

1)software versions maintenance

2)controlling changes in documentation

3)controlling changes to the source code

4) management activities

Report Error

View Answer Report Error Discuss

1 3768