Sunday, November 29, 2009

Database System-I

1.What is foreign Key? What is its purpose?
A non key attribute, whose value are derived from the primary key of some other table, is known as foreign key in the current table.The table in which this non-key attribute i.e. foreign key attribute exists, is called a foreign table.

2.Define the terms  Tuple and  Attribute
Tuples: The rows of tables (relations) are generally referred to as tuples. Attribute: The columns of tables are generally referred to as attribute.

3.What do you understand by the terms Cardinality and Degree of the table?
Degree: The number of attributes in a relation determines the degree of a relation. A relation having 3 attributes is said to be a relation of degree 3.
Cardinality: The number of rows in a relation is known as Cardinality.

4.What is the main function of DBA.
The DBA must be a manager, more than a technician-seeking to meet the needs of people who use the data. Since many user may share the same data resource, the DBA must be prepared to meet the need and objective.

5.Write a query on the customers table whose output will exclude all customers with a rating <=100, unless they are located in Shimla.
SELECT *  FROM customers  WHERE rating >100 OR city =’Shimla’ ;

6.Write a query that selects all orders except those zeros or NULLs in  the amount field.
SELECT * FROM Orders  WHERE amt < >0  AND (amt IS NOT NULL) ;

7.Write a query that lists customers in descending order of rating. Output the rating field first, followed by the customer’s name and number.
SELECT rating, cust-name, cust-num FROM customers ORDER BY rating DESC;

8.Write a command that puts the following values, in their given order, into the salesman table: cust-name-Manisha, city-Manali, comm.- NULL, cust-num-1901.
INSERT INTO salesman (city, cust-name, comm.,cust-num)VALUES(‘Manisha’,NULL,1901) ;

9.What are DDL and DML?
The DDL provides statements for the creation and deletion of tables and indexes.
The DML provides statements to enter, update, delete data and perform complex queries on these tables.

10.What is the difference between Where and Having Clause?
The HAVING clause places the condition on group but WHERE clause places the condition on individual rows

11.What do you understand by constraints?
Constraints are used to enforce rules at table level when ever row is inserted, updated/deleted from table.
Constraints can be defined to one of the Two level.
Column Level: Reference to a single column. can be defined any type of integrity.
Table Level: References one or more columns and is defined separately from definition of the columns in the table.

12.Write some features of SQL?
Recovery ad Concurrency:- Concurrency is concerned with the manner in which multiple user operate upon the Database.
Security: The Security can be maintained by view mechanism.
Integrity Constraints-> Integrity constraints are enforced by the system.

13.Write various database objects available in SQL?
Table: A Table is used to store Data
View: A view is the temporary table created using Original table.
Sequence:   Sequences are used to generate Primary key value.
Index:  They are used to improve queries.
Synonym: They give alternative names to objects.     

14.Write the rules to name an objects?
The maximum length must be 30 character long.
The Object name  should not contain quotation mark.
The name must start with letter.
The use of $ and # is discouraged in the object name.
A name must not be a reserved name.

15.What are group Functions?
The aggregate functions are group functions. They return result based on groups of rows. The group functions are
AVG(), COUNT(), MAX(),  MIN(), SUM()

16.What are  column alias?
In many  cases heading table may not be descriptive and hence it difficult to understand. In  such case we use columns alias It will change column heading with column alias.

Computer Network-IV


Q.1 What is protocol? How many types of protocols are there?
Ans. When computers communicate each other, there needs to be a common set of rules and instructions that each computer follows. A specific set of communication rules is called a protocol.
Some protocol: PPP, HTTP, SLIP, FTP, TCP/IP


Q.2 What is the difference between Networking and Remote Networking?
Ans. The main difference between Networking and Remote Networking, is the network which we use in offices or other places locally such LAN or INTERNET and remote networking is one which we use TERMINAL Services to communicate with the remote users such WAN.


Q.3 What is point-to-point protocol?
Ans. A communication protocol used to connect computer to remote networking services include Internet Service Providers. In networking, the Point-to-Point protocol is commonly used to establish a direct connection between two nodes. Its primary use has been to connect computers using a phone line.


Friday, November 13, 2009

Computer Network-III


1. What is packet filter?
Packet filter is a standard router equipped with some extra functionality. The extra functionality allows every incoming or outgoing packet to be inspected. Packets meeting some criterion are forwarded normally. Those that fail the test are dropped.

2. What is traffic shaping?
One of the main causes of congestion is that traffic is often busy. If hosts could be made to transmit at a uniform rate, congestion would be less common. Another open loop method to help manage congestion is forcing the packet to be transmitted at a more predictable rate. This is called traffic shaping.

3. What is multicast routing?
Sending a message to a group is called multicasting, and its routing algorithm is called multicast routing.

Computer Network-II


1. What is Bandwidth?
Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth.

2. What are the types of Transmission media?
Signals are usually transmitted over some transmission media that are broadly classified in to two categories.
Guided Media:
These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.
b) Unguided Media:
This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony.

3. What is Project 802?
It is a project started by IEEE to set standards to enable intercommunication between equipment from a variety of manufacturers. It is a way for specifying functions of the physical layer, the data link layer and to some extent the network layer to allow for interconnectivity of major LAN protocols.
It consists of the following:
802.1 is an internetworking standard for compatibility of different LANs and MANs across protocols.
802.2 Logical link control (LLC) is the upper sublayer of the data link layer which is non-architecture-specific, that is remains the same for all IEEE-defined LANs.
Media access control (MAC) is the lower sublayer of the data link layer that contains some distinct modules each carrying proprietary information specific to the LAN product being used. The modules are Ethernet LAN (802.3), Token ring LAN (802.4), Token bus LAN (802.5).
802.6 is distributed queue dual bus (DQDB) designed to be used in MANs.

Friday, November 06, 2009

Computer Fundamental-IX

>
1. Which of the following is a web browser?
a. Paint
b. Power point
c. Firefox
d. Word

2. Most of the commonly used personal computers/laptops do not have a command key known as-
a. Turnover
b. Shift
c. Alter
d. Delete

3. What is the full form of USB as used in computer related activities?
a. Universal security Block
b. Ultra serial block
c. United service block
d. Universal serial bus

Sunday, November 01, 2009

Computer Fundamental-VIII


1. To indent the first paragraph of your report, you should use this key
a. Space bar
b. Return key
c. Tab key
d. Shift key

2. _______ are distinct items that don’t have much meaning to you in a given context.
a. Fields
b. Data
c. Queries
d. Properties

3. A website address is a unique name that identifies a specific _______ on the web.
a. Web browser
b. PDA
c. Website
d. Link

4. An example of a telecommunications device is a
a. Keyboard
b. Modem
c. Mouse
d. Printer

5. Which is the best definition of a software package?
a. An add-on for your computer such as additional memory
b. A set of computer programs used for a certain function such as word processing
c. A protection you can buy for a computer
d. The box, manual and license agreement that accompany commercial software

Computer Fundamental-VII


1. Special effect used to introduce slides in a presentation are called
a. Effect
b. Custom animation
c. Transition
d. Animation

2. Computers send and receive data in the form of ____________ signals.
a. Analog
b. Digital
c. Modulated
d. All of the above

3. Most World Wide Web pages contain commands in the language.
a. NIH
b. URL
c. HTML
d. IRC

4. _____________ are graphical objects used to represent commonly used application.
a. GUI
b. Drivers
c. Windows
d. Icons

5. Which of the following operating systems is not owned and licensed by a company?
a. Unix
b. Linux
c. Windows 2000
d. Mac

6. In any window, the maximize button, the minimize button and the close button appears on
a. the title bar
b. menu bar
c. status bar
d. tool bar

7. Which is the slowest internet connection service?
a. Digital subscriber line
b. T1
c. Dial up service
d. Cable modem

8. Every component of your computer is either
a. Software of CPU/RAM
b. Hardware or software
c. Application software or system software
d. Input devices or output devices

9. Checking that a pin code number is valid before it is entered into the system in an example of
a. Error connection
b. Backup and recovery
c. Data preparation
d. Data validation

10. A compiler translates higher-level programs into a machine language program, which is called
a. Source code
b. Object code
c. Compiled code
d. Beta code

11. A field that uniquely identifies which person, thing or event the recode describes is a
a. File
b. Data
c. Field
d. Key

12. The ability to find an individual item in a file immediately
a. Sequential access
b. File allocation table
c. Direct access
d. Directory

13. Computers connected to a LAN can
a. Run faster
b. Go on line
c. Email
d. Share information and/or share devices

14. A CD-RW disk
a. Has a faster access than an internal disk
b. Is a form of optical disk, so it an only be written once
c. Holds less data than a floppy disk
d. Can be erased and rewritten

15. The two major categories of software include
a. Operating system and utility
b. Personal productivity and system
c. System and application
d. System and utility

16. Windows 95, windows 98 and windows NT are known as
a. Processors
b. Domain names
c. Modems
d. Operating system

17. Information on a computer is stored as
a. Analog data
b. Digital data
c. Modem data
d. Watts data

18. To take information from one source and bring it to your computer is referred to as
a. Upload
b. Download
c. Transfer
d. De-link

19. A program that works like a calculator for keeping track of money and making budgets
a. Calculator
b. Keyboard
c. Spreadsheets
d. Scholastic

20. Each box in a spreadsheet is called
a. Cell
b. Empty space
c. Record
d. Field
__________________________________________________________________________________

Search Aptipedia