0% found this document useful (0 votes)
14 views19 pages

Net Peper

The document contains a series of questions and answers across various topics in computer science, including Discrete Structures, Computer Networks, DBMS, Algorithms, Operating Systems, Theory of Computation, Software Engineering, Artificial Intelligence, Web Technologies, Data Structures, and more. Each section features multiple-choice questions with correct answers and explanations. Key concepts covered include graph theory, TCP/IP model, ACID properties, sorting algorithms, OSI model layers, network protocols, IP addressing, and security measures.

Uploaded by

avanishks786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views19 pages

Net Peper

The document contains a series of questions and answers across various topics in computer science, including Discrete Structures, Computer Networks, DBMS, Algorithms, Operating Systems, Theory of Computation, Software Engineering, Artificial Intelligence, Web Technologies, Data Structures, and more. Each section features multiple-choice questions with correct answers and explanations. Key concepts covered include graph theory, TCP/IP model, ACID properties, sorting algorithms, OSI model layers, network protocols, IP addressing, and security measures.

Uploaded by

avanishks786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

1.

Discrete Structures
Q1: What is the chromatic number of a complete bipartite graph K3,3K3,3?
a) 2
b) 3
c) 4
d) 5
Answer: a) 2
Explanation: A bipartite graph can be colored with 2 colors such that no two
adjacent vertices share the same color.
Q2: Which of the following is a tautology?
a) P→(Q→P)P→(Q→P)
b) P→¬PP→¬P
c) P∧¬PP∧¬P
d) P→QP→Q
Answer: a) P→(Q→P)P→(Q→P)
Explanation: This is equivalent to P→(¬Q∨P)P→(¬Q∨P), which is always true.

2. Computer Networks
Q3: In the TCP/IP model, which layer corresponds to the OSI model's Transport
Layer?
a) Internet Layer
b) Application Layer
c) Host-to-Host Layer
d) Network Access Layer
Answer: c) Host-to-Host Layer
Explanation: The Host-to-Host Layer in TCP/IP handles functions like flow control
and error correction, similar to the OSI Transport Layer.
Q4: What is the maximum data rate of a noiseless 4 kHz channel using 8 bits per
sample?
a) 8 kbps
b) 16 kbps
c) 32 kbps
d) 64 kbps
Answer: d) 64 kbps
Explanation: By Nyquist theorem: 2×4000×8=64,0002×4000×8=64,000 bps.

3. DBMS
Q5: Which ACID property ensures that transactions are executed completely or
not at all?
a) Atomicity
b) Consistency
c) Isolation
d) Durability
Answer: a) Atomicity
Explanation: Atomicity guarantees that a transaction is treated as a single,
indivisible unit.
Q6: In SQL, which clause is used to eliminate duplicate rows?
a) DISTINCT
b) UNIQUE
c) GROUP BY
d) HAVING
Answer: a) DISTINCT
Explanation: The SELECT DISTINCT clause removes duplicate records from the
result set.

4. Algorithms
Q7: Which algorithm uses the "divide and conquer" strategy?
a) Bubble Sort
b) Quick Sort
c) Insertion Sort
d) Selection Sort
Answer: b) Quick Sort
Explanation: Quick Sort divides the array into partitions and recursively sorts
them.
Q8: What is the time complexity of the Floyd-Warshall algorithm for finding all-
pairs shortest paths?
a) O(V3)O(V3)
b) O(V2)O(V2)
c) O(Vlog⁡V)O(VlogV)
d) O(Elog⁡V)O(ElogV)
Answer: a) O(V3)O(V3)
Explanation: It uses three nested loops over the number of vertices VV.

5. Operating Systems
Q9: Which page replacement algorithm suffers from Belady’s Anomaly?
a) FIFO
b) LRU
c) Optimal
d) MRU
Answer: a) FIFO
Explanation: Increasing the number of frames in FIFO can sometimes increase
page faults.
Q10: What is the primary role of the "scheduler" in an OS?
a) Manage I/O operations
b) Allocate CPU time to processes
c) Handle memory allocation
d) Manage file systems
Answer: b) Allocate CPU time to processes
6. Theory of Computation
Q11: Which grammar is used to describe the syntax of programming languages?
a) Regular Grammar
b) Context-Free Grammar
c) Context-Sensitive Grammar
d) Unrestricted Grammar
Answer: b) Context-Free Grammar
Explanation: CFGs are used in parsers (e.g., BNF notation).
Q12: Which problem is undecidable?
a) Halting Problem
b) Sorting
c) Matrix Multiplication
d) Shortest Path
Answer: a) Halting Problem
Explanation: Turing proved no algorithm can solve the Halting Problem for all
inputs.

7. Software Engineering
Q13: Which testing focuses on internal logic of code?
a) Black-box Testing
b) White-box Testing
c) Regression Testing
d) Alpha Testing
Answer: b) White-box Testing
Explanation: It tests internal structures like loops and branches.
Q14: In Agile methodology, what is a "sprint"?
a) A fixed time period for task completion
b) A type of software bug
c) A testing phase
d) A documentation process
Answer: a) A fixed time period for task completion

8. Artificial Intelligence
Q15: Which algorithm uses a minimax strategy?
a) A*
b) Alpha-Beta Pruning
c) K-Means
d) Q-Learning
Answer: b) Alpha-Beta Pruning
Explanation: It optimizes the minimax algorithm by pruning branches in game
trees.
Q16: What is the heuristic function in Hill Climbing?
a) Cost so far
b) Estimated cost to the goal
c) Path length
d) Random value
Answer: b) Estimated cost to the goal

9. Web Technologies
Q17: Which tag is used to embed JavaScript in HTML?
a) <script>
b) <js>
c) <javascript>
d) <code>
Answer: a) <script>
Q18: What does REST stand for?
a) Representational State Transfer
b) Remote State Transfer
c) Resource State Transfer
d) Rapid State Transfer
Answer: a) Representational State Transfer

10. Data Structures


Q19: What is the worst-case time complexity of Quick Sort?
a) O(n)O(n)
b) O(nlog⁡n)O(nlogn)
c) O(n2)O(n2)
d) O(log⁡n)O(logn)
Answer: c) O(n2)O(n2)
Explanation: Occurs when the pivot is the smallest or largest element.
Q20: Which data structure uses LIFO order?
a) Queue
b) Stack
c) Linked List
d) Tree
Answer: b) Stack

1. OSI Model
Q1: Which layer of the OSI model is responsible for end-to-end
communication and error recovery?
a) Network
b) Transport
c) Data Link
d) Session
Answer: b) Transport
Explanation:
 The Transport layer (Layer 4) ensures reliable data transfer between
devices (e.g., TCP).
 Functions include segmentation, flow control, and error correction.
 Incorrect Options: Network layer handles routing (Layer 3); Data Link
manages MAC addressing (Layer 2); Session manages dialogues (Layer 5).

2. Protocols
Q2: Which protocol is connectionless and used for real-time applications like
video streaming?
a) TCP
b) FTP
c) UDP
d) HTTP
Answer: c) UDP
Explanation:
 UDP (User Datagram Protocol) is connectionless, fast, and ideal for real-
time traffic.
 Incorrect Options: TCP is connection-oriented; FTP/HTTP are application-
layer protocols.

3. IP Addressing
Q3: What is the network address of a host with IP 192.168.1.15/28?
a) 192.168.1.0
b) 192.168.1.16
c) 192.168.1.15
d) 192.168.1.32
Answer: a) 192.168.1.0
Explanation:
 Subnet mask /28 = 255.255.255.240.
 Block size = 256−240=16256−240=16.
 The network address is the first IP in the subnet (192.168.1.0).

4. Subnetting
Q4: How many subnets are created with a subnet mask of 255.255.255.224 for
a Class C network?
a) 2
b) 6
c) 8
d) 16
Answer: c) 8
Explanation:
 Class C default mask: 255.255.255.0.
 Subnet bits = 224−0=224224−0=224 → Binary: 11100000 (3 bits).
 Subnets = 23=823=8.

5. Routing
Q5: Which routing protocol uses the Bellman-Ford algorithm?
a) OSPF
b) RIP
c) BGP
d) EIGRP
Answer: b) RIP
Explanation:
 RIP (Routing Information Protocol) uses hop count and Bellman-Ford for
path calculation.
 Incorrect Options: OSPF uses Dijkstra; BGP is path-vector.

6. Network Devices
Q6: A switch operates at which OSI layer?
a) Physical
b) Data Link
c) Network
d) Transport
Answer: b) Data Link
Explanation:
 Switches use MAC addresses (Layer 2) to forward frames.
 Incorrect Options: Routers operate at Layer 3 (Network).

7. Wireless Networks
Q7: Which IEEE standard defines Wi-Fi 6?
a) 802.11ac
b) 802.11n
c) 802.11ax
d) 802.11g
Answer: c) 802.11ax
Explanation:
 Wi-Fi 6 (802.11ax) supports higher throughput and efficiency in dense
environments.

8. Security
Q8: Which protocol provides secure web browsing?
a) HTTP
b) FTP
c) HTTPS
d) SMTP
Answer: c) HTTPS
Explanation:
 HTTPS (HTTP + SSL/TLS) encrypts data between client and server.

9. Error Detection
Q9: Which method uses polynomial division for error detection?
a) Checksum
b) CRC
c) Parity
d) Hamming Code
Answer: b) CRC
Explanation:
 CRC (Cyclic Redundancy Check) generates a checksum via polynomial
division.

10. Port Numbers


Q10: Which port is used by DNS?
a) 25
b) 53
c) 80
d) 443
Answer: b) 53
Explanation:
 DNS uses UDP/TCP port 53 for resolving domain names.

11. Network Topologies


Q11: Which topology requires a central device like a hub or switch?
a) Bus
b) Star
c) Ring
d) Mesh
Answer: b) Star
Explanation:
 In a Star topology, all nodes connect to a central device.

12. MAC Address


Q12: A MAC address is how many bits long?
a) 16
b) 32
c) 48
d) 64
Answer: c) 48
Explanation:
 MAC addresses are 48-bit identifiers (e.g., 00:1A:2B:3C:4D:5E).

13. DHCP
Q13: What is the primary role of DHCP?
a) Resolve domain names
b) Assign dynamic IP addresses
c) Encrypt data
d) Detect errors
Answer: b) Assign dynamic IP addresses
Explanation:
 DHCP (Dynamic Host Configuration Protocol) automates IP assignment.

14. Firewalls
Q14: A stateful firewall operates at which layer(s)?
a) Network
b) Transport
c) Application
d) All of the above
Answer: d) All of the above
Explanation:
 Stateful firewalls track active connections and operate across multiple OSI
layers.

15. IPv6
Q15: Which IPv6 address type is used for link-local communication?
a) Unicast
b) Multicast
c) Anycast
d) FE80::/10
Answer: d) FE80::/10
Explanation:
 IPv6 link-local addresses start with FE80::/10 and are used for local
network communication.
16. ARP
Q16: What does ARP resolve?
a) IP to MAC
b) MAC to IP
c) Domain to IP
d) IP to Hostname
Answer: a) IP to MAC
Explanation:
 ARP (Address Resolution Protocol) maps IP addresses to MAC addresses.

17. VLAN
Q17: What is the purpose of a VLAN?
a) Divide a network into subnets
b) Create separate broadcast domains
c) Encrypt network traffic
d) Assign IP addresses
Answer: b) Create separate broadcast domains
Explanation:
 VLANs (Virtual LANs) segment networks logically, reducing broadcast
traffic.

18. HTTP Methods


Q18: Which HTTP method is idempotent?
a) POST
b) PUT
c) DELETE
d) Both b and c
Answer: d) Both b and c
Explanation:
 PUT and DELETE are idempotent (multiple identical requests = single
request).

19. Congestion Control


Q19: Which algorithm is used by TCP for congestion control?
a) Sliding Window
b) Leaky Bucket
c) Token Bucket
d) AIMD
Answer: d) AIMD
Explanation:
 AIMD (Additive Increase Multiplicative Decrease) adjusts window size to
avoid congestion.
20. IoT Protocols
Q20: Which protocol is designed for constrained IoT devices?
a) HTTP
b) MQTT
c) FTP
d) SMTP
Answer: b) MQTT
Explanation:
 MQTT (Message Queuing Telemetry Transport) is lightweight and ideal for
IoT.
1. OSI Model & TCP/IP Model
1. Q: Which OSI layer is responsible for logical addressing and routing?
a) Physical
b) Data Link
c) Network
d) Transport
Answer: c) Network
Explanation: The Network layer handles IP addressing and routing (e.g.,
routers).
2. Q: Which layer translates data into a format suitable for the application?
a) Presentation
b) Session
c) Application
d) Transport
Answer: a) Presentation
Explanation: Handles encryption, compression, and data formatting.
3. Q: The Transport layer in TCP/IP corresponds to which OSI layer(s)?
a) Transport
b) Session + Transport
c) Transport + Network
d) Physical + Data Link
Answer: a) Transport
Explanation: TCP/IP’s Transport layer maps directly to OSI’s Transport
layer.

2. Network Devices
4. Q: Which device operates at the Data Link layer?
a) Hub
b) Switch
c) Router
d) Repeater
Answer: b) Switch
Explanation: Switches use MAC addresses (Layer 2).
5. Q: A device that connects two dissimilar networks is a:
a) Bridge
b) Gateway
c) Router
d) Repeater
Answer: b) Gateway
Explanation: Gateways translate protocols between different networks.

3. Protocols & Port Numbers


6. Q: Which protocol uses port 443?
a) HTTP
b) FTP
c) HTTPS
d) SMTP
Answer: c) HTTPS
Explanation: HTTPS uses port 443 for secure communication.
7. Q: Which protocol is connectionless and unreliable?
a) TCP
b) UDP
c) FTP
d) HTTP
Answer: b) UDP
Explanation: UDP does not guarantee delivery or order.
8. Q: DHCP is used for:
a) Domain name resolution
b) Assigning IP addresses dynamically
c) File transfer
d) Error detection
Answer: b) Assigning IP addresses dynamically

4. IP Addressing & Subnetting


9. Q: The IPv4 address 192.168.1.0 with subnet mask 255.255.255.192
allows how many hosts per subnet?
a) 62
b) 64
c) 30
d) 32
Answer: a) 62
Explanation: Subnet mask /26 leaves 6 bits for
hosts: 26−2=6226−2=62.
10.Q: Which IPv6 address type is used for a single interface?
a) Unicast
b) Multicast
c) Anycast
d) Broadcast
Answer: a) Unicast

5. Routing
11.Q: Which routing protocol uses the Dijkstra algorithm?
a) RIP
b) OSPF
c) BGP
d) EIGRP
Answer: b) OSPF
Explanation: OSPF uses the Shortest Path First (Dijkstra) algorithm.
12.Q: What metric does RIP use?
a) Hop count
b) Bandwidth
c) Delay
d) Cost
Answer: a) Hop count

6. Network Security
13.Q: Which protocol provides secure remote login?
a) FTP
b) SSH
c) Telnet
d) HTTP
Answer: b) SSH
Explanation: SSH encrypts remote terminal sessions.
14.Q: A firewall operates at which OSI layer(s)?
a) Network
b) Transport
c) Application
d) All of the above
Answer: d) All of the above
Explanation: Modern firewalls work at multiple layers.

7. Wireless Networks
15.Q: Which IEEE standard defines Wi-Fi 6?
a) 802.11ac
b) 802.11n
c) 802.11ax
d) 802.11g
Answer: c) 802.11ax
16.Q: Bluetooth uses which frequency band?
a) 2.4 GHz
b) 5 GHz
c) 900 MHz
d) 60 GHz
Answer: a) 2.4 GHz

8. Network Topologies
17.Q: Which topology is most fault-tolerant?
a) Bus
b) Star
c) Mesh
d) Ring
Answer: c) Mesh
Explanation: Multiple paths ensure redundancy.

9. Error Detection & Correction


18.Q: Which error detection method uses polynomial division?
a) Checksum
b) CRC
c) Parity
d) Hamming Code
Answer: b) CRC

10. Miscellaneous
19.Q: What does ARP resolve?
a) IP to MAC address
b) MAC to IP address
c) Domain name to IP
d) IP to hostname
Answer: a) IP to MAC address
20.Q: Which protocol is used for email retrieval?
a) SMTP
b) IMAP
c) SNMP
d) HTTP
Answer: b) IMAP

Q: Full form of VLAN: Answer: Virtual Local Area Network.


Q: Purpose of NAT: Answer: Translate private IP to public IP.
Q: Maximum data rate of a channel (Nyquist
theorem): Answer: 2Blog⁡2L2Blog2L.
Q: ICMP is used for: Answer: Error reporting and diagnostics.
Q: HTTP is stateless because: Answer: No session information is
retained.
Q: Default subnet mask for Class B: Answer: 255.255.0.0.
Q: CSMA/CD is used in: Answer: Ethernet (collision detection).
Q: MIME is associated with: Answer: Email attachments.
Q: Traceroute uses: Answer: ICMP/UDP with TTL.
Q: MAC address size: Answer: 48 bits.
Q: 3-way handshake is part of: Answer: TCP connection setup.
Q: Ping uses: Answer: ICMP Echo Request/Reply.
Q: Sliding window protocol ensures: Answer: Flow control.
Q: SONET is used in: Answer: Optical fiber communication.
Q: DNS uses which transport protocol? Answer: UDP (typically).
Q: VPN creates: Answer: Secure tunnel over public networks.
Q: FDDI is a: Answer: Token-passing ring network.
Q: Bit stuffing is used in: Answer: Framing (Data Link layer).
Q: Token Bucket Algorithm manages: Answer: Traffic shaping.
Q: RTT stands for: Answer: Round Trip Time.
Q: Socket address combines: Answer: IP + Port.
Q: HDLC is a: Answer: Data Link layer protocol.
Q: Multicast IP range: Answer: 224.0.0.0 to 239.255.255.255.
Q: QoS ensures: Answer: Prioritized traffic handling.
Q: 5G uses mmWave in which frequency? Answer: 24–100 GHz.
Q: MPLS operates at: Answer: Between Layer 2 and 3.
Q: BGP is a: Answer: Path-vector routing protocol.
Q: CDN purpose: Answer: Reduce latency by caching content.
Q: IoT protocol for constrained devices: Answer: MQTT/CoAP.
Q: TCP vs UDP: Which is faster? Answer: UDP.

1. Database Fundamentals
1. Q: The primary purpose of a DBMS is to:
a) Store data
b) Provide data abstraction and independence
c) Create backups
d) Generate reports
Answer: b)
Explanation: DBMS ensures logical and physical data independence,
hiding storage details from users.
2. Q: Which data model uses "tables" to represent data?
a) Hierarchical
b) Network
c) Relational
d) Object-oriented
Answer: c)
Explanation: Relational models organize data into rows and columns
(relations).

2. ER Diagrams & Keys


3. Q: In an ER diagram, a diamond shape represents:
a) Entity
b) Attribute
c) Relationship
d) Weak entity
Answer: c)
Explanation: Diamonds denote relationships between entities.
4. Q: A superkey with no proper subset that is also a superkey is called:
a) Primary key
b) Candidate key
c) Foreign key
d) Alternate key
Answer: b)
Explanation: A candidate key is a minimal superkey.

3. Relational Algebra
5. Q: Which operation combines two relations vertically?
a) Join
b) Union
c) Intersection
d) Projection
Answer: b)
Explanation: Union appends rows from two relations with the same
schema.
6. Q: The symbol "σ" in relational algebra denotes:
a) Projection
b) Selection
c) Join
d) Rename
Answer: b)
Explanation: σ (sigma) selects rows based on a condition.

4. SQL
7. Q: Which SQL clause filters groups after aggregation?
a) WHERE
b) HAVING
c) GROUP BY
d) ORDER BY
Answer: b)
Explanation: HAVING filters groups created by GROUP BY,
while WHERE filters rows.
8. Q: What does ON DELETE CASCADE enforce?
a) Prevents deletion
b) Deletes referencing rows
c) Sets NULL in referencing rows
d) Rolls back the transaction
Answer: b)
Explanation: It automatically deletes dependent rows in child tables.

5. Normalization
9. Q: A relation is in 2NF if it is in 1NF and:
a) No partial dependencies
b) No partial dependencies on the primary key
c) No transitive dependencies
d) All attributes are atomic
Answer: b)
Explanation: 2NF eliminates partial dependencies (non-prime attributes
depend on the full primary key).
10.Q: Which normal form eliminates transitive dependencies?
a) 1NF
b) 2NF
c) 3NF
d) BCNF
Answer: c)
Explanation: 3NF removes non-key attributes dependent on other non-
key attributes.

6. Transactions & ACID


11.Q: The "A" in ACID properties stands for:
a) Availability
b) Atomicity
c) Accuracy
d) Association
Answer: b)
Explanation: Atomicity ensures transactions are all-or-nothing.
12.Q: Which concurrency issue occurs when two transactions read
uncommitted data?
a) Lost update
b) Dirty read
c) Phantom read
d) Inconsistent analysis
Answer: b)
Explanation: Dirty reads occur when a transaction reads data modified
by an uncommitted transaction.

7. Indexing & Hashing


13.Q: A B+ tree index is preferred over B-tree because:
a) It supports range queries efficiently
b) It uses less memory
c) It has shorter height
d) It allows duplicate keys
Answer: a)
Explanation: B+ trees store data in leaf nodes linked sequentially, aiding
range queries.
14.Q: Which hashing technique handles collisions using linked lists?
a) Open addressing
b) Separate chaining
c) Linear probing
d) Double hashing
Answer: b)
Explanation: Separate chaining uses linked lists to manage collisions.

8. Concurrency Control
15.Q: In Two-Phase Locking (2PL), the phase where locks are released is:
a) Growing phase
b) Shrinking phase
c) Commit phase
d) Abort phase
Answer: b)
Explanation: Locks are acquired in the growing phase and released in the
shrinking phase.
16.Q: Which timestamp-based method ensures serializability?
a) Lock-based
b) Thomas Write Rule
c) Strict 2PL
d) Wait-Die
Answer: b)
Explanation: Thomas Write Rule ignores outdated writes to maintain
serializability.

9. Advanced Topics
17.Q: In a distributed database, horizontal fragmentation splits a table by:
a) Columns
b) Rows
c) Both
d) Nodes
Answer: b)
Explanation: Horizontal fragmentation divides rows (e.g., by region).
18.Q: CAP theorem states that a distributed system cannot simultaneously
guarantee:
a) Consistency, Availability, Partition tolerance
b) Consistency, Accuracy, Performance
c) Concurrency, Atomicity, Durability
d) None of the above
Answer: a)
Explanation: CAP theorem highlights trade-offs in distributed systems.

10. Practice Questions (Brief)


19.Q: The minimal superkey is called: Answer: Candidate key.
20.Q: SQL command to revoke privileges: Answer: REVOKE.
21.Q: ACID property ensuring transaction permanence: Answer: Durability.
22.Q: Join that returns all rows from both tables: Answer: Full outer join.
23.Q: Normalization step after 3NF: Answer: BCNF.
24.Q: Operation to combine columns: Answer: Projection.
25.Q: Entity without a primary key: Answer: Weak entity.
26.Q: SQL constraint for unique values: Answer: UNIQUE.
27.Q: Deadlock prevention using transaction age: Answer: Wait-Die/Wound-
Wait.
28.Q: Index structure for equality searches: Answer: Hash index.
29.Q: View updated when base tables change: Answer: Updatable view.
30.Q: Rule for foreign key references: Answer: Referential integrity.
31.Q: SQL TRUNCATE vs DELETE: Answer: TRUNCATE removes all
rows; DELETE can filter.
32.Q: Conflict serializability ensured by: Answer: Precedence graph.
33.Q: Disk block access method: Answer: File organization (e.g., heap,
indexed).
34.Q: SQL CHECK constraint enforces: Answer: Domain integrity.
35.Q: Phantom read problem prevented by: Answer: Range locks.
36.Q: DML command example: Answer: INSERT, UPDATE.
37.Q: Data dictionary stores: Answer: Metadata.
38.Q: Cartesian product in relational algebra: Answer: Cross join.
39.Q: SQL BETWEEN operator: Answer: Inclusive range filter.
40.Q: Role of DBA: Answer: Manage database structure, security, backups.
41.Q: Multi-version concurrency control (MVCC): Answer: Snapshot isolation.
42.Q: SQL COALESCE function: Answer: Returns first non-null value.
43.Q: Denormalization purpose: Answer: Improve query performance.
44.Q: SQL injection prevention: Answer: Parameterized queries.
45.Q: Boyce-Codd Normal Form (BCNF): Answer: Every determinant is a
candidate key.
46.Q: Lossless join decomposition: Answer: Preserves data integrity.
47.Q: GRANT and REVOKE are part of: Answer: DCL (Data Control Language).
48.Q: SQL CURSOR use: Answer: Iterate over query results.
49.Q: RAID level for mirroring: Answer: RAID 1.
50.Q: Database recovery technique using logs: Answer: Rollback/Redo.

You might also like