Technical Questions

Q:

 In the relational model, relationships between relations or tables are created by using:

A) composite keys. B) determinants.
C) candidate keys. D) foreign keys.
 
Answer & Explanation Answer: D) foreign keys.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

1 5429
Q:

What are the different hazards? How do you avoid them?

Answer

There are situations, called hazards, that prevent the next insturction in the instruction stream from executing during its designated clock cycle. hazards reduce the performance from the ideal speedup gained by pipelining.


There are three classes of Hazards:


1. Structural hazards: It arise from resource conficts when the hardware cannot support all possible combinations of instructions simultaniously in overlapped execution.


2. Data Hazards: It arise when an instruction depends on the results of previous instruction in a way that is exposed by the overlapping of instructions in the pipeline.


3.control hazards. it arise from the pipelining of branches and other instructions that chage the PC.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

12 5424
Q:

The Microsoft Access wildcards are ____ and ____ .

A) asterisk (*); percent sign (%)   B) percent sign (%); underscore (_)  
C) underscore(_); question mark (?) D) question mark (?); asterisk (*)
 
Answer & Explanation Answer: D) question mark (?); asterisk (*)

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Operating Systems
Exam Prep: Bank Exams
Job Role: IT Trainer

81 5392
Q:

A collection of interrelated records is called a

A) Datasheet B) Spreadsheet
C) Database D) Utility File
 
Answer & Explanation Answer: C) Database

Explanation:
Report Error

View Answer Report Error Discuss

5 5388
Q:

By default, a Linux user falls under which group?

A) same as userid (UPG) B) system
C) staff D) others
 
Answer & Explanation Answer: A) same as userid (UPG)

Explanation:

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel. By default, a Linux user falls under same as userid (UPG) group.

Report Error

View Answer Report Error Discuss

47 5357
Q:

SQL Server program code that is executed instead of an SQL command that needs to be processed is called

A) INSTEAD OF trigger. B) BEFORE trigger.
C) AFTER trigger. D) BEGIN trigger.
 
Answer & Explanation Answer: A) INSTEAD OF trigger.

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

0 5352
Q:

Why crystal is a preferred clock source?

Answer

Because of high stability, large Q (Quality Factor) & the frequency that doesn't drift with aging. Crystal is used as a clock source most of the times.

Report Error

View answer Workspace Report Error Discuss

Subject: Hardware

0 5288
Q:

 If a table has been normalized so that all determinants are candidate keys, then that table is in:

A) 1NF B) 2NF
C) 3NF D) BCNF
 
Answer & Explanation Answer: D) BCNF

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: Database

2 5281