Practice IT DBMS Questions and Answers
- Which normal form ensures that every determinant is a candidate key?
- Which of the following schedules is serializable?
- In two-phase locking, a transaction releases its locks:
- Indexes improve query performance but can degrade performance of:
- In relational algebra, the operation that combines tuples from two relations using common attribute values is:
- Which type of attack exploits software bugs to execute arbitrary code on a system?
- HTTPS ensures which of the following?
- Which layer of the OSI model handles logical addressing and routing?
- Which of the following is a type of phishing attack?
- The command to test reachability of a host in Linux is:
- Which of the following is true about ACID properties in DBMS?
- Which SQL statement is used to remove all rows from a table without logging individual row deletions?
- In a relational database, which relationship allows multiple records in one table to be associated with multiple records in another table?
- In DBMS, which scheduling method ensures serializability of transactions?
- Which normal form ensures no partial dependency of non-prime attributes on a candidate key?
- Which of the following is true about the primary key in a relational database?
- Which of the following is a weak entity in a database?
- Which DBMS command is used to remove a table completely along with its structure?
- Which normal form eliminates transitive dependency?
- Which type of DBMS model organizes data in tables with rows and columns?
- Which SQL constraint ensures that a column cannot have NULL values?
- Which of the following is used to enforce referential integrity?
- Which type of join returns all rows from the left table and matching rows from the right table?
- In a relational database, what is a candidate key?
- Which of the following is used to remove all records from a table without removing the table structure?
- In a relational schema, which normal form eliminates transitive dependencies (i.e., non-prime attribute depends on another non-prime attribute)?
- A transaction that reads a value then later sees a different value because another transaction updated and committed in between experiences which anomaly?
- Which of the following concurrency control methods avoids deadlocks entirely but can reduce concurrency by blocking transactions at start?
- In indexing, which tree is most commonly used for disk-based indexing because it minimizes disk seeks and keeps nodes dense?
- Which SQL isolation level allows phantom reads but prevents dirty reads and non-repeatable reads?
- Given the `SinglyLinkedList` and its `delete_node` method as provided, what will be the output of `my_list.print_list()` after the following sequence of op...
- What does re.sub(r'(\w+)', r'_\1_', 'hello world') return?
- What does [aeiou] match in a regular expression?Â
- What will re.findall(r'\d+', 'abc123def45ghi') return?Â
- Consider the following Java code snippet public class Car {   private String model;   private int year;   public Car(String model, int year) ...
- You have a Python list of fruits and want to extract a specific sub-list using slicing. Â Complete the missing part of the code to obtain the sub-list `['b...
- Which of the following is NOT a common type of error encountered during software development?Â
- In the context of debugging an Object-Oriented program, what does "stepping over" a method call typically do in a debugger?Â
- A programmer is trying to debug an issue where an `ArrayList` (or equivalent dynamic array) in their Java/Python code unexpectedly throws an `IndexOutOfB...
- Consider a scenario in an OOP application where a `NullPointerException` (or equivalent) occurs when trying to access a member of an object. What is the mo...
More Topics
- Algorithms Questions
- Analog and Digital Communication Questions
- Artificial Intelligence & Machine Language Questions
- Basics of Computers Questions
- Big Data Analytics Questions
- C Programming Questions
- C++ Questions
- Compiler Design Questions
- Computer Architecture and Design Questions
- Cyber Security Questions
- Data Analytics Languages Questions
- Data Structure Questions
- Data Warehousing Questions
- Digital Logic Questions
- IOT and mobile Computing Questions
- IT Networking Questions
- IT Operating System Questions
- Machine Learning Questions
- Memory Management Questions
- Microsoft Office Questions
- Network Layer and IP Protocol Questions
- Numerical and Statistical Computing Questions
- Object Oriented Programming Questions
- OOPS Concepts Questions
- Previous Year Questions Questions
- Python Questions
- Shell Scripting Questions
- Software Engineering and Web Technology Questions
- SQL Questions