New
RBI Grade B 6th Batch Starts April 1: Download Your Study Plan Now
Login
Register
More Topics
Home
Questions
Information Technology Professional Knowledge
IT Networking
Practice IT Networking Questions and Answers
Question Listing
Cardinality related to ————–
How many labeled binary tress can be made with n nodes?
"Parity bits" are used for which of the following purposes?
A proxy server is used as the computer?
Which of the following will occur when we broadcast two packets on the medium at a time?
SELECTGETDATE(); This query will give
__________ is capable of taking decisions on its own.
Which is not a datatype of COBOL language
COBOL is used in
SELECT E.EmpFname, E.EmpLname, P.EmpPosition FROM EmployeeInfo E INNER JOIN EmployeePosition P ON E.EmpID = P.EmpID AND P.EmpPosition IN ('Manager'); This...
Write a query to fetch department-wise count of employees sorted by department’s count in ascending order. EmployeeInfo is the table name. ...
Which is not true for B-Tree?
Consider a B+-tree in which the maximum number of keys in a node is 5. What is the minimum number of keys in any non-root node?
A B-tree of order 4 is built from scratch by 10 successive insertions. What is the maximum number of node splitting operations that may take place?
A is the only candidate key. Then how many superkey possible with R(A,S,C,D)
AB`->` CD AF`->` D DE`->` F C`->` G F`->` E G`->` A Then which of the following is false?
Relation R(A,B,C,D,E) has {AB`->` C, C`->` D,B`->` EA} FUNCTIONAL DEPENDENCY Find the candidate key of the relation.
F={PR`` ST, PSU`` QR} which of the following is trivial functional dependency in F closure?
relation R(ABCD) has these dependencies {A → B, B → C,C → D} and it is decomposed into three relations R1(AB) , R2(BC), AND R3(CD). State true or fal...
Identify the highest normal form for the given set of dependencies on relation R R(ABCDE)= {AB → C, C → D, D → E, E → A,D → B} ...
3NF is best suitable for designing of the database?
The search key used in Index file is also used to physically order the database and search key is the primary key or candidate key of the database. This...
Efficiency of the token ring is high if-
_________ is token ring.
What type of acknowledgement system is used in 802.5?
What Are The Functions Of A Switch?
State true or false In Hub there is one collision domain and one broadcast domain. In Switch there is multiple collision domain and one broadcast domain....
If the destination MAC address is not found in the MAC address table, the switch forwards the frame out all of its ports except the port on which the frame...
Which Technology is used for collision detect in Local Area Network
Unique Logical address is assigned to each host in which layer
Default value of boolean variable in an array
Concatenate two strings by using which function?
Default value of float variable in an array
Boolean occupies how much space in a 32 bit system
Physical limitation of a signal is called?
Function to copy one memory location to other in C++
Join in which result is generated when variable matches from any one of table
Which of the following is not true about OLTP?
Join in which result is generated only when variable matches from both tables.
The weakening of signal in long-term transmission is called?
Page 2 of 31
Previous
1
2
3
4
5
6
7
...
30
31
Next
Last
More Topics
×
Algorithms Questions
Basics of Computers Questions
C Programming Questions
Compiler Design Questions
IT DBMS Questions
IT Operating System Questions
Today's Class
There is no live class for today.
×
I Pledged to:
callback wala button
×
Please Enter Details
Please enter Name
We'll never share your email with anyone else.
Please enter Correct Mobile Number
We'll never share your email with anyone else.
Request a Call Back
Thank You
Update Address
Please enter complete address
Please enter pincode
Please enter State
Select State
Please enter City
Add Address
Download the app
×
X
×