Currently Browsing : Answer.

  • RDBMS Interview Answers 51 to 65 – Commonly Asked

    51. What are conflict serializable schedules? Ans: A schedule S of n transactions is serializable if it is equivalent to some serial schedule of the same n transactions. 52. What is result equivalent? Ans: Two schedules are called result equivalent if they produce the same final state of the data base. 53. What are conflict equivalent schedules? Ans: Two schedules are said to be conflict equivalent if the order of any…

    View Details
  • RDBMS Interview Answers 41 to 50 – Commonly Asked

    41. What is RAID Technology? Ans: Redundant array of inexpensive (or independent) disks. The main goal of raid technology is to even out the widely different rates of performance improvement of disks against those in memory and microprocessor. Raid technology employs the technique of data striping to achieve higher transfer rates. 42. What is Hashing technique? Ans: This is a primary file organization technique that provides very fast access to records…

    View Details
  • RDBMS Interview Answers 31 to 40 – Commonly Asked

    31. What is Cardinality ratio? Ans: The cardinality ratio for a binary relationship specifies the number of relationship instances that an entity can participate in. 32. What is a Participation constraint? Ans: The participation constraint specifies whether the existence of an entity depends on its being related to another entity via the relationship type. This is of two types: 1. Total participation. 2. Partial participation. 33. What is a weak entity…

    View Details
  • RDBMS Interview Answers 21 to 30 – Commonly Asked

    21. What are different DBMS languages? Ans: 1. DDL (Data definition language) 2. SDL (Storage definition language) 3. VDL (View definition language) 4. DML (Data manipulation language) 22. What are different types of DBMS? Ans: 1. DBMS 2. RDBMS (Relational) 3. ORDBMS (Object Relational) 4. DDBMS (Distributed) 5. FDBMS (Federated) 6. HDDBMS (Homogeneous) 7. HDBMS (Hierarchical) 8. NDBMS (Networked) 23. What is an entity? Ans: An entity is a thing in…

    View Details
  • RDBMS Interview Answers 11 to 20 – Commonly Asked

    11. What is the job of DBA? Ans: A database administrator is a person or a group responsible for authorizing access to the database, for coordinating and monitoring its use, and for acquiring s/w and h/w resources as needed. 12. Who are db designer? Ans: Data base designers are responsible for identifying the data to be stored in the database and for choosing appropriate structure to represent and store this data…

    View Details
  • RDBMS Interview Answers 1 to 10 – Commonly Asked

    1.What is a Database? Ans: A database is a collection of related data .A database is a logically coherent collection of data with some inherent meaning. 2. What is DBMS? Ans: Database Management system is a collection of programs that enables user to create and maintain a database. Thus a DBMS is a general purposed s/w system that facilitates the process of defining constructing and manipulating a database for various applications. (Defining…

    View Details
  • C Programming Interview Answers 91 to 106

    91. What are the pointer declarations used in C? Ans: 1- Array of pointers, e.g , int *a[10]; Array of pointers to integer 2-Pointers to an array,e.g , int (*a)[10]; Pointer to an array of into 3-Function returning a pointer,e.g, float *f( ) ; Function returning a pointer to float 4-Pointer to a pointer ,e.g, int **x; Pointer to apointer to int 5-pointer to a data type ,e.g, char *p; pointer…

    View Details
  • C Programming Interview Answers 81 to 90

    81. What is a file pointer? Ans: The pointer to a FILE data type is called as a stream pointer or a file pointer. A file pointer points to the block of information of the stream that had just been opened. 82. How is fopen()used ? Ans: The function fopen() returns a file pointer. Hence a file pointer is declared and it is assigned as FILE *fp; fp= fopen(filename,mode); filename is…

    View Details
  • C Programming Interview Answers 71 to 80

    71. What are the two forms of #include directive? Ans: 1.#include”filename” 2.#include the first form is used to search the directory that contains the source file.If the search fails in the home directory it searches the implementation defined locations.In the second form ,the preprocessor searches the file only in the implementation defined locations. 72. How would you use the functions randomize() and random()? Ans: Randomize() initiates random number generation with a…

    View Details
  • C Programming Interview Answers 61 to 70

    61. What do the ‘c’ and ‘v’ in argc and argv stand for? Ans: The c in argc(argument count) stands for the number of command line argument the program is invoked with and v in argv(argument vector) is a pointer to an array of character string that contain the arguments. 62. IMP>what are C tokens? Ans: There are six classes of tokens: identifier, keywords, constants, string literals, operators and other separators….

    View Details
  • C Programming Interview Answers 51 to 60

    51. Difference between formal argument and actual argument? Ans: Formal arguments are the arguments available in the function definition. They are preceded by their own data type. Actual arguments are available in the function call. These arguments are given as constants or variables or expressions to pass the values to the function. 52. Is it possible to have more than one main() function in a C program ? Ans: The function…

    View Details
  • C Programming Interview Answers 41 to 50

    41. What is the purpose of realloc? Ans: It increases or decreases the size of dynamically allocated array. The function realloc (ptr,n) uses two arguments. The first argument ptr is a pointer to a block of memory for which the size is to be altered. The second argument specifies the new size. The size may be increased or decreased. If sufficient space is not available to the old region the function…

    View Details
  • C Programming Interview Answers 31 to 40

    31. What is near pointer? Ans: A near pointer is 16 bits long. It uses the current content of the CS (code segment) register (if the pointer is pointing to code) or current contents of DS (data segment) register (if the pointer is pointing to data) for the segment part, the offset part is stored in a 16 bit near pointer. Using near pointer limits the data/code to 64kb segment. 32….

    View Details

Why Us : At the leading career guidance portal, get updates & study material of latest government jobs, entrance exams, admit card, college admissions, syllabus, results, talent search exams, olympiads & more.
Content Disclaimer : The content of this website is provided for information purposes only, we are not responsible for any mistakes. If found any mistakes in this page, please E-mail us to [email protected]