17 COMP N/W MCQ 7
7-1. DHCP Server provides _____ to the client.
A. Protocol
B. IP Address
C. MAC Address
D. Network Address
7-2. A set of rules that govern all aspects of information communication is
called
A. Server
B. Internet
C. Protocol
D. OSI Model
7-3. The processes on each machine that communicate at a given layer
are called
A. UDP process
B. Intranet process
C. Server technology
D. Peer-peer process
7-4. The duration of time it takes to send a message from one end of a
network to the other and back is called
A. Round Trip Time (RTT)
B. Full Duplex Time (FDT)
C. Circle Trip Time (CTT)
D. Data Travelling Time (DTT)
7-5. Which of the following layer is not network support layer?
A. Transport Layer
B. Network Layers
C. Data link Layer
D. Physical Layer
7-6. For error detection ________ is used by the higher layer protocols
(TCP/IP).
A. Bit-sum
B. Checksum
C. Data-sum
D. Error-bit
7-7. The amount of data that can be carried from one point to another
in a given time period is called
A. Scope
B. Capacity
C. Bandwidth
D. Limitation
7-8. Controlling access to a network by analyzing the incoming and
outgoing packets is called
A. IP Filtering
B. Data Filtering
C. Packet Filtering
D. Firewall Filtering
7-9. The management of data flow between computers or devices or
between nodes in a network is called
A. Flow control
B. Data Control
C. Data Management
D. Flow Management
7-10. Which of the following is not the possible ways of data exchange?
A. Simplex
B. Multiplex
C. Half-duplex
D. Full-duplex
Answers
1 – B 2 – C 3 – D 4 – A 5 – A
6 – B 7 – C 8 – C 9 – A 10 – B
A. Protocol
B. IP Address
C. MAC Address
D. Network Address
7-2. A set of rules that govern all aspects of information communication is
called
A. Server
B. Internet
C. Protocol
D. OSI Model
7-3. The processes on each machine that communicate at a given layer
are called
A. UDP process
B. Intranet process
C. Server technology
D. Peer-peer process
7-4. The duration of time it takes to send a message from one end of a
network to the other and back is called
A. Round Trip Time (RTT)
B. Full Duplex Time (FDT)
C. Circle Trip Time (CTT)
D. Data Travelling Time (DTT)
7-5. Which of the following layer is not network support layer?
A. Transport Layer
B. Network Layers
C. Data link Layer
D. Physical Layer
7-6. For error detection ________ is used by the higher layer protocols
(TCP/IP).
A. Bit-sum
B. Checksum
C. Data-sum
D. Error-bit
7-7. The amount of data that can be carried from one point to another
in a given time period is called
A. Scope
B. Capacity
C. Bandwidth
D. Limitation
7-8. Controlling access to a network by analyzing the incoming and
outgoing packets is called
A. IP Filtering
B. Data Filtering
C. Packet Filtering
D. Firewall Filtering
7-9. The management of data flow between computers or devices or
between nodes in a network is called
A. Flow control
B. Data Control
C. Data Management
D. Flow Management
7-10. Which of the following is not the possible ways of data exchange?
A. Simplex
B. Multiplex
C. Half-duplex
D. Full-duplex
Answers
1 – B 2 – C 3 – D 4 – A 5 – A
6 – B 7 – C 8 – C 9 – A 10 – B
16 COMP N/W MCQ 6
6-1. What is the IP Address range of APIPA?
A. 169.254.0.1 to 169.254.0.254
B. 169.254.0.1 to 169.254.0.255
C. 169.254.0.1 to 169.254.255.254
D. 169.254.0.1 to 169.254.255.255
6-2. Which of the following is correct in VLSM?
A. Can have subnets of different sizes
B. Subnets must be in same size
C. No required of subnet
D. All of above
6-3. What does the port number in a TCP connection specify?
A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
6-4. The class-based addressing is also known as
A. Modern Model
B. Classful Model
C. Classless Model
D. Heterogeneous Model
6-5. Which of the following is correct in CIDR?
A. Class A includes Class B network
B. There are only two networks
C. There are high & low class network
D. There is no concept of class A, B, C networks
6-6. What is the size of Source and Destination IP address in IP header?
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
6-7. Which of the following is reliable communication?
A. TCP
B. IP
C. UPD
D. All of them
6-8. What is the typical range of Ephemeral ports?
A. 1 to 80
B. 1 to 1024
C. 80 to 8080
D. 1024 to 65535
6-9. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
6-10. What is the natural mask for a class C Network?
A. 255.255.255.1
B. 255.255.255.0
C. 255.255.255.254
D. 255.255.255.255
Answers
1 – C 2 – A 3 – A 4 – B 5 – D
6 – D 7 – A 8 – D 9 – A 10 – B
A. 169.254.0.1 to 169.254.0.254
B. 169.254.0.1 to 169.254.0.255
C. 169.254.0.1 to 169.254.255.254
D. 169.254.0.1 to 169.254.255.255
6-2. Which of the following is correct in VLSM?
A. Can have subnets of different sizes
B. Subnets must be in same size
C. No required of subnet
D. All of above
6-3. What does the port number in a TCP connection specify?
A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
6-4. The class-based addressing is also known as
A. Modern Model
B. Classful Model
C. Classless Model
D. Heterogeneous Model
6-5. Which of the following is correct in CIDR?
A. Class A includes Class B network
B. There are only two networks
C. There are high & low class network
D. There is no concept of class A, B, C networks
6-6. What is the size of Source and Destination IP address in IP header?
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
6-7. Which of the following is reliable communication?
A. TCP
B. IP
C. UPD
D. All of them
6-8. What is the typical range of Ephemeral ports?
A. 1 to 80
B. 1 to 1024
C. 80 to 8080
D. 1024 to 65535
6-9. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
6-10. What is the natural mask for a class C Network?
A. 255.255.255.1
B. 255.255.255.0
C. 255.255.255.254
D. 255.255.255.255
Answers
1 – C 2 – A 3 – A 4 – B 5 – D
6 – D 7 – A 8 – D 9 – A 10 – B
15 MIX MCQ 1
1)The LRU algorithm
a)pages out pages that have not been used recently
b)pages out pages that have been least used recently
c)pages out pages that have been used recently
d)pages out of first page in a given order
ANS :
1)b
In Least Recently Used (LRU) algorithm is a Greedy algorithm where the page to be replaced is
least recently used.
2)Leaf Class is
a)A class with no subclass
b)A class with one subclass
c)A class having exactly two subclass
d)A class having more than one subclasses
ANS:
2)a
a leaf class is a class that should not be subclassed. This can be enforced either by
convention, or by using a language feature such as the final keyword in Java or the sealed
keyword in C#.
3)Interrupt enable instruction is
a)DI
b)EI
c)EPI
d)EAI
ANS:
3)b
The Enable Interrupts (EI) and Disable Interrupts (DI) instructions allow the MP to permit or
deny interrupts under program control. For the EI, the interrupts will be enabled following the completion of the next instruction following the EI. This allows at least one more instruction, perhaps a RET or JMP, to be executed before the MP allows itself to again be interrupted. For the DI, the interrupts are disabled immediately. No ags are aected.
HALT and NO-OP: The Halt (HLT) and No-Operation (NOP) instructions serve general utility
purposes. The Halt will stop the processor from further execution; it can be restarted again
only by an interrupt. A reset signal applied to the MP will abort the Halt. The MP may enter a
Hold state, as the result of another device wanting the bus, from a Halt, but will return to the
Halt state when the Hold is canceled. The NOP is simply a one-byte long place holder, which is passed through automatically without any data motion or action of any kind.
4)TLB is the acronym of
a)Translation Looking Buer
b)Translation Left Buer
c)Translation Look Block
d)Translation Lookaside Buer
ANS:
4)d
TLB(Translation Lookaside Buer)
is a cache that memory management hardware uses to
improve virtual address translation speed. TLBs can suer
performance issues from multitasking and code errors. This performance degradation is called a cache thrash. Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conicts in the caching system.
5)The process of organising the memory into two banks to allow 8 and 16-bit data
operation is called
a)Indexed Mapping
b)Bank-switching
c)Memory Segmentation
d)Two-way memory interleaving
ANS:
5)d
It is a technique for compensating the relatively slow speed of DRAM(Dynamic RAM). In this
technique, the main memory is divided into memory banks which can be accessed
individually without any dependency on the other.A interleaved memory with ‘n’ banks is said to be ‘n’-way interleaved.
6)Feedback property is related to
a)Asynchronous
b)Synchronous
c)Flooding
d)Both(a) and (b)
ANS :
6)b
Feedback property is related to synchronous transmission.It is a data transfer method in
which a continuous stream of data signal is accompanied by timing signal to ensure that
transmitted receiver an in step with each other.
7)SSTF scheduling
a)SSTF chooses the pending request closest to current head position
b)Selects the request with the minimum seek time from the current head position
c)It may cause starvation of some requests
d)All of the above
ANS:
7)d
In SSTF (Shortest Seek Time First), requests having shortest seek time are executed first.
So, the seek time of every request is calculated in advance in queue and then they are scheduled according to their calculated seek time. As a result, the request near the disk arm will get executed first.
SSTF is certainly an improvement over FCFS as it decreases the average
response time and increases the throughput of system.There is great chance of starvation
would take place in SSTF.The reason or this is if there were lot of requests close to each other
the other requests will never be handled since the distance will always be greater.
8)For which of the data structure link lists are not suitable
a)Radix sort
b)Bubble sort
c)Binary search
d)Insertion sort
ANS:
8)c
We can’t apply binary search algorithm directly on linked list because here memory is not
contiguous ,so middle element can’t be found in o(1).We can use two pointer for nding
the middle element and then apply binary search on it.
9)Fetch and decode cycle is not required in
a)Direct addressing
b)Immediate addressing
c)Indirect addressing
d)All of the above
ANS:
9)b
An immediate operand has a constant value or an expression. When an instruction with two
operands uses immediate addressing, the first operand may be a register or memory
location, and the second operand is an immediate constant. The first operand denes the length of the data.
10)Which is the most commonly used transmission speeds in bps used in data
communication
a)1200
b)9600
c)4800
d)2400
ANS
10)b
Data are transmitted at the speed of electricity, but one bit at a time.Typically 8 bits are
required to transmit each character.A normally functioning voice circuit is theoretically able to transmit 9600 bits per second characters per second but the eective
transmission rate is about 1000 characters per second.
a)pages out pages that have not been used recently
b)pages out pages that have been least used recently
c)pages out pages that have been used recently
d)pages out of first page in a given order
ANS :
1)b
In Least Recently Used (LRU) algorithm is a Greedy algorithm where the page to be replaced is
least recently used.
2)Leaf Class is
a)A class with no subclass
b)A class with one subclass
c)A class having exactly two subclass
d)A class having more than one subclasses
ANS:
2)a
a leaf class is a class that should not be subclassed. This can be enforced either by
convention, or by using a language feature such as the final keyword in Java or the sealed
keyword in C#.
3)Interrupt enable instruction is
a)DI
b)EI
c)EPI
d)EAI
ANS:
3)b
The Enable Interrupts (EI) and Disable Interrupts (DI) instructions allow the MP to permit or
deny interrupts under program control. For the EI, the interrupts will be enabled following the completion of the next instruction following the EI. This allows at least one more instruction, perhaps a RET or JMP, to be executed before the MP allows itself to again be interrupted. For the DI, the interrupts are disabled immediately. No ags are aected.
HALT and NO-OP: The Halt (HLT) and No-Operation (NOP) instructions serve general utility
purposes. The Halt will stop the processor from further execution; it can be restarted again
only by an interrupt. A reset signal applied to the MP will abort the Halt. The MP may enter a
Hold state, as the result of another device wanting the bus, from a Halt, but will return to the
Halt state when the Hold is canceled. The NOP is simply a one-byte long place holder, which is passed through automatically without any data motion or action of any kind.
4)TLB is the acronym of
a)Translation Looking Buer
b)Translation Left Buer
c)Translation Look Block
d)Translation Lookaside Buer
ANS:
4)d
TLB(Translation Lookaside Buer)
is a cache that memory management hardware uses to
improve virtual address translation speed. TLBs can suer
performance issues from multitasking and code errors. This performance degradation is called a cache thrash. Cache thrash is caused by an ongoing computer activity that fails to progress due to excessive use of resources or conicts in the caching system.
5)The process of organising the memory into two banks to allow 8 and 16-bit data
operation is called
a)Indexed Mapping
b)Bank-switching
c)Memory Segmentation
d)Two-way memory interleaving
ANS:
5)d
It is a technique for compensating the relatively slow speed of DRAM(Dynamic RAM). In this
technique, the main memory is divided into memory banks which can be accessed
individually without any dependency on the other.A interleaved memory with ‘n’ banks is said to be ‘n’-way interleaved.
6)Feedback property is related to
a)Asynchronous
b)Synchronous
c)Flooding
d)Both(a) and (b)
ANS :
6)b
Feedback property is related to synchronous transmission.It is a data transfer method in
which a continuous stream of data signal is accompanied by timing signal to ensure that
transmitted receiver an in step with each other.
7)SSTF scheduling
a)SSTF chooses the pending request closest to current head position
b)Selects the request with the minimum seek time from the current head position
c)It may cause starvation of some requests
d)All of the above
ANS:
7)d
In SSTF (Shortest Seek Time First), requests having shortest seek time are executed first.
So, the seek time of every request is calculated in advance in queue and then they are scheduled according to their calculated seek time. As a result, the request near the disk arm will get executed first.
SSTF is certainly an improvement over FCFS as it decreases the average
response time and increases the throughput of system.There is great chance of starvation
would take place in SSTF.The reason or this is if there were lot of requests close to each other
the other requests will never be handled since the distance will always be greater.
8)For which of the data structure link lists are not suitable
a)Radix sort
b)Bubble sort
c)Binary search
d)Insertion sort
ANS:
8)c
We can’t apply binary search algorithm directly on linked list because here memory is not
contiguous ,so middle element can’t be found in o(1).We can use two pointer for nding
the middle element and then apply binary search on it.
9)Fetch and decode cycle is not required in
a)Direct addressing
b)Immediate addressing
c)Indirect addressing
d)All of the above
ANS:
9)b
An immediate operand has a constant value or an expression. When an instruction with two
operands uses immediate addressing, the first operand may be a register or memory
location, and the second operand is an immediate constant. The first operand denes the length of the data.
10)Which is the most commonly used transmission speeds in bps used in data
communication
a)1200
b)9600
c)4800
d)2400
ANS
10)b
Data are transmitted at the speed of electricity, but one bit at a time.Typically 8 bits are
required to transmit each character.A normally functioning voice circuit is theoretically able to transmit 9600 bits per second characters per second but the eective
transmission rate is about 1000 characters per second.
14 COMP N/W MCQ 5
5-1 Which of the following is not the External Security Threats?
A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
5-2 What is the Demilitarized Zone?
A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
5-3 What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks
5-4 What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
5-5 What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
5-6 What is the usable size of Network bits in Class B of IP address?
A. 04
B. 08
C. 14
D. 16
5-7 In which type of RAID, data is mirrored between two disks.
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
5-8 What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
5-9 Which of the following is/are Protocols of Application?
A. FTP
B. DNS
C. Telnet
D. All of above
5-10 Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C
Answers
1 – C 2 – A 3 – A 4 – D 5 – C
6 – C 7 – B 8 – A 9 – D 10 – D
A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
5-2 What is the Demilitarized Zone?
A. The area between firewall & connection to an external network
B. The area between ISP to Military area
C. The area surrounded by secured servers
D. The area surrounded by the Military
5-3 What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks
5-4 What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
5-5 What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
5-6 What is the usable size of Network bits in Class B of IP address?
A. 04
B. 08
C. 14
D. 16
5-7 In which type of RAID, data is mirrored between two disks.
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 3
5-8 What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
5-9 Which of the following is/are Protocols of Application?
A. FTP
B. DNS
C. Telnet
D. All of above
5-10 Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C
Answers
1 – C 2 – A 3 – A 4 – D 5 – C
6 – C 7 – B 8 – A 9 – D 10 – D
13 COMP N/W MCQ 4
*NOTE:Answer Key at bottom
4-1. What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
4-2. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
4-3. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
4-4. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway
D. Modems
4-5. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
4-6. MAC Address is the example of
A. Transport Layer
B. Data Link Layer
C. Application Layer
D. Physical Layer
4-7. Routing tables of a router keeps track of
A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination
4-8. Layer-2 Switch is also called
A. Multiport Hub
B. Multiport Switch
C. Multiport Bridge
D. Multiport NIC
4-9. Difference between T568A and T568B is
A. Difference in wire color
B. Difference in number of wires
C. Just different length of wires
D. Just different manufacturer standards
4-10. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
Answers
1 – D
2 – B
3 – C
4 – B
5 – A
6 – B
7 – D
8 – C
9 – D
10 – A
4-1. What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
4-2. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
4-3. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
4-4. Which of the following can be Software?
A. Routers
B. Firewalls
C. Gateway
D. Modems
4-5. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
4-6. MAC Address is the example of
A. Transport Layer
B. Data Link Layer
C. Application Layer
D. Physical Layer
4-7. Routing tables of a router keeps track of
A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination
4-8. Layer-2 Switch is also called
A. Multiport Hub
B. Multiport Switch
C. Multiport Bridge
D. Multiport NIC
4-9. Difference between T568A and T568B is
A. Difference in wire color
B. Difference in number of wires
C. Just different length of wires
D. Just different manufacturer standards
4-10. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
Answers
1 – D
2 – B
3 – C
4 – B
5 – A
6 – B
7 – D
8 – C
9 – D
10 – A
12 DBMS MCQ 6
1. Using which language can a user request information from a database ?
a) Query
b) Relational
c) Structural
d) Compiler
Answer:a
Explanation:Query language is a method through which the database entries can be accessed.
2. Student(ID, name, dept name, tot_cred)
In this query which attribute form the primary key?
a) Name
b) Dept
c) Tot_cred
d) ID
Answer:d
Explanation:The attributes name ,dept and tot_cred can have same values unlike ID .
3. Which one of the following is a procedural language ?
a) Domain relational calculus
b) Tuple relational calculus
c) Relational algebra
d) Query language
Answer:c
Explanation:Domain and Tuple relational calculus are non-procedural language.Query language is a method through which the database entries can be accessed.
4. The_____ operation allows the combining of two relations by merging pairs of tuples, one from each relation, into a single tuple.
a) Select
b) Join
c) Union
d) Intersection
Answer:b
Explanation:Join finds the common tuple in the relations and combines it.
5. The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match.
a) Join
b) Cartesian product
c) Intersection
d) Set difference
Answer:b
Explanation:Cartesian product is the multiplication of all the values in the attributes.
6. The _______operation performs a set union of two “similarly structured” tables
a) Union
b) Join
c) Product
d) Intersect
Answer:a
Explanation:Union just combines all the values of relations of same attributes.
7. The most commonly used operation in relational algebra for projecting a set of tuple from a relation is
a) Join
b) Projection
c) Select
d) Union
Answer:c
Explanation:Select is used to view the tuples of the relation with or without some constraints.
8. The _______ operator takes the results of two queries and returns only rows that appear in both result sets.
a) Union
b) Intersect
c) Difference
d) Projection
Answer:b
Explanation:The union operator gives the result which is the union of two queries and difference is the one where query which is not a part of second query .
9. A ________ is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys.
a) Schema diagram
b) Relational algebra
c) Database diagram
d) Schema flow
Answer:a
Explanation:None.
10. The _________ provides a set of operations that take one or more relations as input and return a relation as an output.
a) Schematic representation
b) Relational algebra
c) Scheme diagram
d) Relation flow
Answer:b
Explanation:None.
a) Query
b) Relational
c) Structural
d) Compiler
Answer:a
Explanation:Query language is a method through which the database entries can be accessed.
2. Student(ID, name, dept name, tot_cred)
In this query which attribute form the primary key?
a) Name
b) Dept
c) Tot_cred
d) ID
Answer:d
Explanation:The attributes name ,dept and tot_cred can have same values unlike ID .
3. Which one of the following is a procedural language ?
a) Domain relational calculus
b) Tuple relational calculus
c) Relational algebra
d) Query language
Answer:c
Explanation:Domain and Tuple relational calculus are non-procedural language.Query language is a method through which the database entries can be accessed.
4. The_____ operation allows the combining of two relations by merging pairs of tuples, one from each relation, into a single tuple.
a) Select
b) Join
c) Union
d) Intersection
Answer:b
Explanation:Join finds the common tuple in the relations and combines it.
5. The result which operation contains all pairs of tuples from the two relations, regardless of whether their attribute values match.
a) Join
b) Cartesian product
c) Intersection
d) Set difference
Answer:b
Explanation:Cartesian product is the multiplication of all the values in the attributes.
6. The _______operation performs a set union of two “similarly structured” tables
a) Union
b) Join
c) Product
d) Intersect
Answer:a
Explanation:Union just combines all the values of relations of same attributes.
7. The most commonly used operation in relational algebra for projecting a set of tuple from a relation is
a) Join
b) Projection
c) Select
d) Union
Answer:c
Explanation:Select is used to view the tuples of the relation with or without some constraints.
8. The _______ operator takes the results of two queries and returns only rows that appear in both result sets.
a) Union
b) Intersect
c) Difference
d) Projection
Answer:b
Explanation:The union operator gives the result which is the union of two queries and difference is the one where query which is not a part of second query .
9. A ________ is a pictorial depiction of the schema of a database that shows the relations in the database, their attributes, and primary keys and foreign keys.
a) Schema diagram
b) Relational algebra
c) Database diagram
d) Schema flow
Answer:a
Explanation:None.
10. The _________ provides a set of operations that take one or more relations as input and return a relation as an output.
a) Schematic representation
b) Relational algebra
c) Scheme diagram
d) Relation flow
Answer:b
Explanation:None.