Explore topic-wise InterviewSolutions in Current Affairs.

This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.

1.

Why is the multivalue, multicolumn problem another form of the multivalued dependency problem?

Answer»

Both problems try to store multiple values on an attribute in a table. In the multivalue, multiplecolumn problem, the multiple values are stored in different columns. In the mutlivalued dependency problem the multiple values are stored in different rows. In both cases, the solution is the same: store the multiple values in a separate table.

2.

Define the function of microprocessor

Answer»

The Microprocessor is capable of performing various computing functions and making decisions to change the sequence of program executions.

3.

Which incident started the Second World War?

Answer»

Germany’s occupation of Poland on September 01, 1939.

4.

When and where was the first labour union established?

Answer»

‘The international working men’s association’ was the first labour union established in London in the year 1864.

5.

What is the inconsistent values problem? Include an example not used in the text.

Answer»

The inconsistent values problem occurs when different users or data sources use slightly different forms of the same data value. One example is where automobiles are specified as "Ford, 2-door, Red" in one cell and "Red Ford 2-door" in another.

6.

What is Enterprise Resource Planning (ERP), and what kind of a database is used in an ERP application?

Answer»

Enterprise Resource Planning (ERP) is an information system used in manufacturing companies and includes sales, inventory, production planning, purchasing and other business functions. An ERP system typically uses a multiuser database.

7.

What is Microprocessor ?

Answer»

A microprocessor is a multipurpose programmable, clock driven, semiconductor device consisting of electronic logic circuit manufactured by using very large scale integration (VLSI) technique.

  1. A microprocessor is a computer processor wherein the data processing logic and control is included on a single integrated circuit, or a small number of integrated circuits
8.

Give one instance of the cordial relationship between India and Russia.

Answer»

Russia has extended its support to India’s quest for permanent seat in the UN security council.

9.

What are data and information, and how are they related in a database?

Answer»

Data is recorded facts and figures, and information is knowledge derived from data. A database stores data in such a way that information can be created.

10.

What parts does a computer consists ?

Answer»

A computer basically consists of the following parts:- 

1. I/O devices 

2. Memory 

3. CPU 

The CPU is the brain of the computer irrespective of its size. The CPU normally consists of a large scale integration circuit called Microprocessor and works as central processing unit of a microcomputer.

Input Devices give data or information as an input to the CPU and it processes the data or information given by the devices. Memory stores the data or information, Output Devices give the required data as output to the user. 

A digital component in which one microprocessor has been provided to act as a CPU is known as Microcomputer. Desktop computer, laptop computer, palm computer, notebook are the ones which contain only one microprocessor to act as a CPU.

11.

What is deadlock? How can it be avoided? How can it be resolved once it occurs?

Answer»

Deadlock occurs when two transactions are each waiting on a resource that the other transaction holds. Deadlock can be prevented by requiring transactions to acquire all locks at the same time; once it occurs, the only way to cure it is to abort one of the transactions and back out of partially completed work.

12.

Explain the relationship between entity, entity class, and entity instance.

Answer»

An entity is something that can be identified in the users' work environment, something that the users want to track. Entities of a given type are grouped into entity classes. An entity instance is the representation of a particular entity.

13.

ORACLE is a1. Operating System2. Spread Sheet3. Database management system4. Word processing software

Answer» Correct Answer - Option 3 : Database management system

The correct answer is the Database management system.

  • Oracle Database is a relational database management system.
  • This is known as Oracle Database, OracleDB, or Oracle Only.
  • It is manufactured and marketed by Oracle Corporation.
  • The Oracle database is the first database designed for enterprise grid computing.
  • Oracle is one of the largest software companies in the world, founded in 1977 under the name Software Software Corporation.

  • Oracle was originally developed by Lawrence Ellison (Larry Ellishan) and his two friends and his former co-worker in 1977.
  • Oracle DB runs on most major platforms such as Windows, Unix, Linux, and Mac OS.
  • This company developed the world's first Relational Database Management Software Oracle.
  • The main reason for developing it was to keep the database compatible with the newly developed SQL Language.
14.

What is meant by Proactive, Retroactive and Simultaneous Update.

Answer»

1. Proactive Update: The updates that are applied to database before it becomes effective in real world. 

2. Retroactive Update: The updates that are applied to database after it becomes effective in real world. 

3. Simulatneous Update: The updates that are applied to database at the same time when it becomes effective in real world.

15.

What are the different phases of transaction?

Answer»

Different phases are 

1.) Analysis phase, 

2.) Redo Phase, 

3.) Undo phase.

16.

Explain the difference between optimistic locking and pessimistic locking.

Answer»

Optimistic locking assumes no transaction conflict will occur and deals with the consequences if it does. Pessimistic locking assumes that conflict will occur and so prevents it ahead of time with locks. In general, optimistic locking is preferred for the Internet and for many intranet applications.

17.

Explain the difference between attributes and identifiers.

Answer»

Entities have attributes. Attributes are properties that describe the entity's characteristics. Entity instances have identifiers. Identifiers are attributes that name, or identify, entity instances.

18.

What is cold backup and hot backup (in case of Oracle)?

Answer»

1. Cold Backup: It is copying the three sets of files (database files, redo logs, and control file) when the instance is shut down. This is a straight file copy, usually from the disk directly to tape. You must shut down the instance to guarantee a consistent copy. If a cold backup is performed, the only option available in the event of data file loss is restoring all the files from the latest backup. All work performed on the database since the last backup is lost. 

2. Hot Backup: Some sites (such as worldwide airline reservations systems) cannot shut down the database while making a backup copy of the files. The cold backup is not an available option.

19.

What do you mean by flat file database?

Answer»

It is a database in which there are no programs or user access languages. It has no cross-file capabilities but is userfriendly and provides user-interface management.

20.

Are the resulting relations of PRODUCT and JOIN operation the same?

Answer»

No. 

PRODUCT: Concatenation of every row in one relation with every row in another. 

JOIN: Concatenation of rows from one relation and related rows from another.

21.

What are the unary operations in Relational Algebra?

Answer»

PROJECTION and SELECTION.

22.

Explain the difference between an exclusive lock and a shared lock.

Answer»

An exclusive lock prohibits other users from reading the locked resource; a shared lock allows other users to read the locked resource, but they cannot update it.

23.

What are cursors give different types of cursors?

Answer»

PL/SQL uses cursors for all database information accesses statements. 

The language supports the use two types of cursors 

1. Implicit 

2. Explicit

24.

What is "transparent DBMS"?

Answer»

It is one, which keeps its Physical Structure hidden from user.

25.

Discuss the data copy / transfer instructions ?

Answer»

Data Copy / Transfer Instructions : 

MOV : 

This instruction copies a word or a byte of data from some source to a destination. The destination can be a register or a memory location. The source can be a register, a memory location, or an immediate number. 

MOV AX,BX 

MOV AX,5000H 

MOV AX,[SI] 

MOV AX,[2000H] 

MOV AX,50H[BX] 

MOV [734AH],BX 

MOV DS,CX 

MOV CL,[357AH] 

Direct loading of the segment registers with immediate data is not permitted. 

PUSH : Push to Stack 

This instruction pushes the contents of the specified register/memory location on to the stack. The stack pointer is decremented by 2, after each execution of the instruction. 

E.g. PUSH AX 

• PUSH DS 

• PUSH [5000H] 

Fig. 2 Push Data to stack memory 

POP : Pop from Sack

This instruction when executed, loads the specified register/memory location with the contents of the memory location of which the address is formed using the current stack segment and stack pointer. 

The stack pointer is incremented by 2 

Eg. POP AX 

POP DS 

POP [5000H] 

Fig 3 Popping Register Content from Stack Memory 

XCHG : Exchange byte or word 

This instruction exchange the contents of the specified source and destination operands 

Eg. XCHG [5000H], AX

XCHG BX, AX 

XLAT : 

Translate byte using look-up table 

Eg. LEA BX, TABLE1 

MOV AL, 04H 

XLAT 

Simple input and output port transfer Instructions: 

IN: 

Copy a byte or word from specified port to accumulator. 

Eg. IN AL,03H 

IN AX,DX 

OUT: 

Copy a byte or word from accumulator specified port. 

Eg. OUT 03H, AL 

OUT DX, AX 

LEA : 

Load effective address of operand in specified register. [reg] offset portion of address in DS 

Eg. LEA reg, offset 

LDS:

Load DS register and other specified register from memory. 

[reg] [mem] 

[DS] [mem + 2] 

Eg. LDS reg, mem 

LES:

Load ES register and other specified register from memory. 

[reg] [mem] 

[ES] [mem + 2] 

Eg. LES reg, mem

Flag transfer instructions: 

LAHF: 

Load (copy to) AH with the low byte the flag register. 

[AH] [ Flags low byte] 

Eg. LAHF 

SAHF: 

Store (copy) AH register to low byte of flag register. 

[Flags low byte] [AH] 

Eg. SAHF 

PUSHF: 

Copy flag register to top of stack. 

[SP] [SP] – 2 [

[SP]] [Flags] 

Eg. PUSHF 

POPF : 

Copy word at top of stack to flag register.

[Flags] [[SP]] 

[SP] [SP] + 2

26.

You have two tables, EMPLOYEE and COMPUTER that are in a one-to-one relationship. The foreign key is Emp Number in COMPUTER which references Emp Number as the primary key of EMPLOYEE. Explain what must be done to convert the one-to-one EMPLOYEE-COMPUTER relationship to a one-to-many relationship where one employee can have more than one computer.

Answer»

In the one-to-one relationship, there will be a constraint on Emp Number as a foreign key in COMPUTER stating that Emp Number must be unique. To convert the relationship to a one-to-many relationship, just drop this constraint.

27.

What are stand-alone procedures?

Answer»

Procedures that are not part of a package are known as stand-alone because they independently defined. A good example of a stand-alone procedure is one written in a SQL*Forms application. These types of procedures are not available for reference from other Oracle tools. Another limitation of stand-alone procedures is that they are compiled at run time, which slows execution.

28.

What are the primitive operations common to all record management systems?

Answer»

Addition, deletion and modification.

29.

What is a query?

Answer»

A query with respect to DBMS relates to user commands that are used to interact with a data base. The query language can be classified into data definition language and data manipulation language.

30.

Explain how to add a NOT NULL column to a table.

Answer»

First, add the column as NULL. Then use UPDATE to add data to every row. Finally use an ALTER TABLE . . . ALTER COLUMN statement to change the column constraint to NOT NULL.

31.

What is move instructions ?

Answer»

MOV : 

This instruction copies a word or a byte of data from some source to a destination. The destination can be a register or a memory location. The source can be a register, a memory location, or an immediate number.

32.

What is RDBMS KERNEL?

Answer»

Two important pieces of RDBMS architecture are the kernel, which is the software, and the data dictionary, which consists of the system-level data structures used by the kernel to manage the database You might think of an RDBMS as an operating system (or set of subsystems), designed specifically for controlling data access; its primary functions are storing, retrieving, and securing data. An RDBMS maintains its own list of authorized users and their associated privileges; manages memory caches and paging; controls locking for concurrent resource usage; dispatches and schedules user requests; and manages space usage within its table-space structures.

33.

What is Authorization and Integrity manager?

Answer»

It is the program module, which tests for the satisfaction of integrity constraint and checks the authority of user to access data.

34.

Name and describe three types of binary relationships.

Answer»

1:1 - a single entity instance of one type is related to a single-entity instance of another type. 

1:N - a single entity instance of one type is related to many-entity instances of another type. 

M:N - many-entity instances of one type relate to many-entity instances of another type.

35.

What is a dependency graph?

Answer»

A dependency graph is a diagram that is used to portray the connections between database elements. 

For example: a change in a table can potentially impact relationships, views, indexes, triggers, stored procedures, and application programs. These impacts need to be known and accounted for before making database changes.

36.

What do you mean by Correlated subquery?

Answer»

Subqueries, or nested queries, are used to bring back a set of rows to be used by the parent query. Depending on how the subquery is written, it can be executed once for the parent query or it can be executed once for each row returned by the parent query. If the subquery is executed for each row of the parent, this is called a correlated subquery.

A correlated subquery can be easily identified if it contains any references to the parent subquery columns in its WHERE clause. Columns from the subquery cannot be referenced anywhere else in the parent query. The following example demonstrates a non-correlated subquery.

Example: Select * From CUST Where '10/03/1990' IN (Select ODATE From ORDER Where CUST.CNUM = ORDER.CNUM)

37.

What is a cascading update?

Answer»

Referential integrity constraints require that foreign key values in one table correspond to primary key values in another. If the value of the primary key is changed -- that is, updated -- the value of the foreign key must immediately be changed to match it. Cascading updates will set this change to be done automatically by the DBMS whenever necessary.

38.

What is File Manager?

Answer»

It is a program module, which manages the allocation of space on disk storage and data structure used to represent information stored on a disk.

39.

Name the sub-systems of a RDBMS.

Answer»

I/O, Security, Language Processing, Process Control, Storage Management, Logging and Recovery, Distribution Control, Transaction Control, Memory Management, Lock Management.

40.

What is the difference between a correlated subquery and a regular subquery?

Answer»

A correlated subquery appears deceptively similar to a regular subquery. The difference is that a regular subquery can be processed from the bottom up. In a regular subquery, results from the lowest query can be determined and used to evaluate the upper-level query. In contrast, in a correlated subquery, the processing is nested; that is, a row from an upper query statement is used in comparison with rows in a lower level query. The key distinction of a correlated subquery is that the lower-level select statements use columns from upper-level statements.

41.

What is a SQL view? Briefly explain the use of views.

Answer»

A SQL view is a virtual table built from other tables or views. Views are used to 

(1) hide columns or rows, 

(2) show the results of computed columns, 

(3) hide complicated SQL syntax, 

(4) layer built-in functions, 

(5) provide a level of indirection between application programs and tables, 

(6) assign different sets of processing permissions to tables, and 

(7) to assign different sets of triggers to the same table.

42.

Name four applications for triggers.

Answer»

(1) providing default values, 

(2) enforcing data constraints, 

(3) updating views and 

(4) enforcing referential integrity

43.

Which of the following statement is incorrect? a. Left overs should be stored hot to avoid contamination b. Use separate chopping boards and knives for different foods c. Cooked food should be kept covered d. Tongs should be used to serve the food

Answer»

correct option is  a. Left overs should be stored hot to avoid contamination

44.

Which part of the RDBMS takes care of the data dictionary? How?

Answer»

Data dictionary is a set of tables and database objects that is stored in a special area of the database and maintained exclusively by the kernel.

45.

What is Transaction Manager?

Answer»

It is a program module, which ensures that database, remains in a consistent state despite system failures and concurrent transaction execution proceeds without conflicting.

46.

What is the archtetype/instance pattern?

Answer»

The archetype/instance pattern occurs when one entity tracks occurrences of another entity. A common example is the relationship between CLASS and SECTION, where the actual occurrence of a class happens when students register for a SECTION of that CLASS. The archetype/instance pattern is implemented as an ID-dependent relationship.

47.

What are stored procedures, and how do they differ from triggers?

Answer»

A stored procedure is a program that is stored within the database and is compiled when used. They can receive input parameters and they can return results. Unlike triggers, their scope is database-wide; they can be used by any process that has permission to use the database stored procedure.

48.

Why is database redesign necessary?

Answer»

Database redesign is necessary for two reasons. First, redesign is necessary both to fix mistakes made during the initial database design. Second, redesign is necessary to adapt the database to changes in system requirements. Such changes are common because information systems and organizations do not just influence each other they create each other. Thus, new information systems cause changes in systems requirements.

49.

Reetika is six years old, which of the following is incorrect cognitive feature for this age? a. Acquire basic knowledge of numbers b. High level of curiosity c. Logical and systematic thinking d. Limited memory

Answer»

correct option is  c. Logical and systematic thinking

50.

What is Buffer Manager?

Answer»

It is a program module, which is responsible for fetching data from disk storage into main memory and deciding what data to be cache in memory.