RPSC has uploaded the keys on their website.
URL: http://rpsc.rajasthan.gov.in/Interview_Related_Query.aspx
------------------------------------------------------------------------------------------------------------
Following questions have wrong answer in the key of the paper 1:
Q# 147719 : All options are wrong. This question should be removed.
Following questions have wrong answer in the key of paper 2:
Q# 147265 : Correct Answer: 3
Q# 147289 : Correct Answer: 3
Q# 147307 : Correct Answer: 1
Q# 147319 : Correct Answer: 1,2,3 / Question should be removed
Q# 147343 : Correct Answer: 1
Q# 147356 : Correct Answer: 1
Q# 147376 : Correct Answer : 4
Q# 147289 : Correct Answer: 3
Q# 147307 : Correct Answer: 1
Q# 147319 : Correct Answer: 1,2,3 / Question should be removed
Q# 147343 : Correct Answer: 1
Q# 147356 : Correct Answer: 1
Q# 147376 : Correct Answer : 4
------------------------------------------------------------------------------------------------------------
Please go to the following page and let us know your marks: We'll calculate cut off marks and share with you soon.
Please go to the following page and let us know your marks: We'll calculate cut off marks and share with you soon.
Thanks
Study Circle
Study Circle
------------------------------------------------------------------------------------------------------------
Question Paper Preview
Section 1
Question id : 147603 (Correct + 0.83 , Wrong -
0.28)
Series - 1000, 200, 40, ____1. 20 2. 15 3. 8 4. 80
ANS: 3
Question id : 147604 (Correct + 0.83 , Wrong -
0.28)
664, 332, 340, 170, ____, 891. 85 2. 178 3. 170 4. 166
ANS: 2
Question id : 147605 (Correct + 0.83 , Wrong -
0.28)
Fact 1: All dogs like to run, Fact 2: Some dogs like to swim, Fact 3: Some
dogs look like their owners. In the first three statements are facts, which
of the following statements must also be a fact: A. All dogs who like to swim
look like their owners, B. Dogs who like to swim also like to run, C. Dogs
who like to run do not look like their owners.1. Only A 2. Only B 3. B and C 4. A and C
ANS:2
Question id : 147606 (Correct + 0.83 , Wrong -
0.28)
Series - 11, 12, 16, 25, 41, 66, ____1. 87 2. 100 3. 108 4. 102
ANS: 4
Question id : 147607 (Correct + 0.83 , Wrong -
0.28)
How many triangles are there in the following figure ?
![]() 1. 14 2. 13 3. 15 4. 16
ANS: 3
Question id : 147608 (Correct + 0.83 , Wrong -
0.28)
Four friends of Tenth grade were sharing a pizza. They decided that the
oldest among them would get the extra piece. Suresh is two months older than
Gagan, who is three months younger than Nand Kumar. Kishore is one month
older thanGagan. Who should get the extra piece of pizza?1. Suresh 2. Nand Kumar 3. Gagan 4. Kishor
ANS:2
Question id : 147609 (Correct + 0.83 , Wrong -
0.28)
Shrikant is shorter than Nilima. Pratima is tallen than Shrikant. Subhash
is taller then Nilima but shorter than Meera. Nilima is tallen than Pratima.
Who will be in the middle if they stand in a row according to height?1. Shrikant 2. Nilima 3. Subhash 4. Meera
ANS: 2
Question id : 147610 (Correct + 0.83 , Wrong -
0.28)
![]() 1. A 2. B 3. C 4. D
ANS:4
Question id : 147611 (Correct + 0.83 , Wrong -
0.28)
![]() 1. 0.81 2. 0.405 3. 0.225 4. 0.25
ANS: 3
Question id : 147612 (Correct + 0.83 , Wrong -
0.28)
Car : Garage :: Aero plane : ?????1. Port 2. Hanger 3. Depot 4. Harbor
ANS: 2
Question id : 147613 (Correct + 0.83 , Wrong -
0.28)
Vishwanath Anand won the world chess title for how many times1. 4 2. 3 3. 5 4. 2
ANS: 3
Question id : 147614 (Correct + 0.83 , Wrong -
0.28)
Who was captain of IPL winner team 20121. Virat Kohli 2. Gautam Gambhir 3. M.S. Dhoni 4. Harbhajan Singh
ANS:2
Question id : 147615 (Correct + 0.83 , Wrong -
0.28)
Who won Santosh Trophy Football in 20121. Goa 2. Services 3. West Bengal 4. Tamil Nadu
ANS: 2
Question id : 147616 (Correct + 0.83 , Wrong -
0.28)
The idea of India' is written by1. Dilip D'Souza 2. Ram Chandra Guha 3. Sunil Khilnani 4. Santosh Desai
ANS: 3
Question id : 147617 (Correct + 0.83 , Wrong -
0.28)
India's Foreign Secretary presently is1. Veena Sikri 2. Huder Ali 3. Ranjan Mathai 4. S.K. Sharma
ANS: 3
Question id : 147618 (Correct + 0.83 , Wrong -
0.28)
Chief Election Commissioner of India1. V.S. Sampath 2. S.Y. Qureshi 3. B.K. Jutshi 4. Sudhir Verma
ANS: 1
Question id : 147619 (Correct + 0.83 , Wrong -
0.28)
The Governor of Uttarakhand is1. Ram Naresh Yadav 2. V. Manchoo 3. B.L. Joshi 4. Aziz Qureshi
ANS: 4
Question id : 147620 (Correct + 0.83 , Wrong -
0.28)
IMF present Chief is1. Christina Lagrade 2. Camilla Gutt 3. Ivar Rooth 4. Rodrigo Rato
ANS: 1
Question id : 147621 (Correct + 0.83 , Wrong -
0.28)
In May 2011, India and Russia conducted a joint armed exercise, in which
more than 15,000 armedmen participated. The name of the joint exercise was1. Shakti Sambandh 2. Jai Ho 3. Vijay exercise 4. Vijayi Bhav
ANS: NOT SURE
Question id : 147622 (Correct + 0.83 , Wrong -
0.28)
India's Cabinet Secretary is1. Ajit Seth 2. Surendra Singh 3. Prabhat Kumar 4. B.K. Chaturvedi
ANS: 1
Question id : 147623 (Correct + 0.83 , Wrong -
0.28)
What is big size of IPv6 addresses?1. 16 bits 2. 32 bits 3. 64 bits 4. 128 bits
ANS: 4
Question id : 147624 (Correct + 0.83 , Wrong -
0.28)
Which protocol does DHCP uses at the Transport Layer1. UDP 2. IP 3. TCP 4. TRP
ANS: 1
Question id : 147625 (Correct + 0.83 , Wrong -
0.28)
In a Network with 10 switches, how many root bridge(s) would be there?1. One 2. Three 3. Five 4. Ten
Question id : 147626 (Correct + 0.83 , Wrong -
0.28)
CSMA/CD is a set of rules determining -1. How two network devices are performing 2. How two network devices communicates with each other in a wireless network 3. How network devices respond when two devices attempt to use a data channel simultaneously 4. How network devices respond when two devices attempt to use a data channel separately
ANS: 3
Question id : 147627 (Correct + 0.83 , Wrong -
0.28)
The dialogue control and token management are responsiblity of, in OSI
network architecture -1. Network layer 2. Physical layer 3. Session layer 4. Data-link layer
ANS: 3
Question id : 147628 (Correct + 0.83 , Wrong -
0.28)
What is (are) an advantage(s) of using Fibre optics data transmission?1. Fast data transmission 2. Resistance to data theft 3. Low noise level 4. All the above
ANS: 4
Question id : 147629 (Correct + 0.83 , Wrong -
0.28)
Which mode is operating when communication circuits allow transmit data in
both directions but not at the same time?1. A Half-Duplex Mode 2. A Simplex Mode 3. A Full-Duplex Mode 4. An Asynchronous Mode
ANS: 1
Question id : 147630 (Correct + 0.83 , Wrong -
0.28)
Full form of MAC Address?1. Machine Access Coding Address 2. Mode Access Control Address 3. Master Access Code Address 4. Media Access Control Address
ANS: 4
Question id : 147631 (Correct + 0.83 , Wrong -
0.28)
How many layers does OSI network architecture has?1. Five 2. Eight 3. Seven 4. Six
ANS: 3
Question id : 147632 (Correct + 0.83 , Wrong -
0.28)
Class of IP address which provides a maximum of only 254 unique host
addresses per network ID?1. Class D 2. Class C 3. Class A 4. Class B
ANS: 2
Question id : 147633 (Correct + 0.83 , Wrong -
0.28)
DNS is the abbreviation of -1. Dynamic Name System 2. Domain Network Service 3. Domain Name System 4. Dynamic Network Service
ANS: 3
Question id : 147634 (Correct + 0.83 , Wrong -
0.28)
Primary function of the network layer is?1. Error detection 2. Routing 3. Setup a session 4. Encryption
ANS: 2
Question id : 147635 (Correct + 0.83 , Wrong -
0.28)
The loss in signal power as light travels down the fibre is called?1. Prorogation 2. Attenuation 3. Scattering 4. Interruption
ANS: 2
Question id : 147636 (Correct + 0.83 , Wrong -
0.28)
Which of the following communications lines is best suited to interactive
processing applications?1. Narrow Band Lines 2. Simplex Lines 3. Full Duplex Lines 4. Mixed Band Lines
ANS: 3
Question id : 147637 (Correct + 0.83 , Wrong -
0.28)
Layer-1 of the OSI model is?1. Link Layer 2. Physical Layer 3. Presentation Layer 4. Session Layer
ANS: 2
Question id : 147638 (Correct + 0.83 , Wrong -
0.28)
What is a Firewall in the Computer Network?1. The Operating System of Computer Network 2. The Physical boundary of the Network 3. A system designed to prevent unauthorised access 4. A web browsing Software
ANS: 3
Question id : 147639 (Correct + 0.83 , Wrong -
0.28)
IPv4 address is?1. 8 bits 2. 16 bits 3. 32 bits 4. 64 bits
ANS:3
Question id : 147640 (Correct + 0.83 , Wrong -
0.28)
DHCP is the abbreviation of -1. Dynamic Host Control Protocol 2. Dynamic Hyper Configuration Protocol 3. Dynamic Hyper Control Protocol 4. Dynamic Host Configuration Protocol
ANS: 4
Question id : 147641 (Correct + 0.83 , Wrong -
0.28)
TCP / IP is?1. One Protocol 2. Suite of Protocols 3. Application Package 4. Communication medium
ANS: 2
Question id : 147642 (Correct + 0.83 , Wrong -
0.28)
For every IP address, Subnet Mask is?1. Always required 2. Sometimes required 3. Not required 4. None of the above
ANS: 1
Question id : 147643 (Correct + 0.83 , Wrong -
0.28)
With the class-A address of 10.0.0.0 and a subnet mask of 255.255.224.0,
how many subnets can be created?1. 2048 2. 2046 3. 4096 4. 4092
ANS: 2
Question id : 147644 (Correct + 0.83 , Wrong -
0.28)
HOSTS file contains -1. IP addresses followed by comma and name to resolve 2. Name to resolve followed by tab/space and IP addresses 3. IP addresses followed by tab/space and name to resolve 4. Name to resolve followed by comma and IP addresses
ANS: 3
Question id : 147645 (Correct + 0.83 , Wrong -
0.28)
Data Moved across the network in manageable chunks of data is called?1. Headers 2. Packets 3. Records 4. Packages
ANS: 2
Question id : 147646 (Correct + 0.83 , Wrong -
0.28)
What is the standard subnet mask for a class A address?1. 255.255.0.0 2. 255.255.255.0 3. 255.255.255.255 4. 255.0.0.0
ANS: 4
Question id : 147647 (Correct + 0.83 , Wrong -
0.28)
Host(s) for which a network administrator should consider using manually
assigning IP address -1. Server 2. Printers 3. Routers 4. All the above
ANS: 4
Question id : 147648 (Correct + 0.83 , Wrong -
0.28)
What does WINS stand for?1. Windows Internet Name Standard 2. Windows Internal Name Service 3. Windows Internet Name Service 4. Windows Internal Name Standard
ANS: 3
Question id : 147649 (Correct + 0.83 , Wrong -
0.28)
What does OSI stands for?1. Open Standards Interconnection 2. Open Standards Internet 3. Open Standards Interdependence 4. Open Standards Interface
ANS: 1
Question id : 147650 (Correct + 0.83 , Wrong -
0.28)
Can a Server be both an FTP Server and a Web Server?1. No, it cannot be 2. Yes, it can be 3. Yes it can be, but technically it will work as either FTP or Web Server at a time 4. None of the above
ANS : 2
Question id : 147651 (Correct + 0.83 , Wrong -
0.28)
What is the Standard HTTP port?1. 80 2. 161 3. 21 4. 1024
ANS: 1
Question id : 147652 (Correct + 0.83 , Wrong -
0.28)
Router is a device?1. that generates protocols 2. that interconnects networks 3. that control the traffic on a network 4. that manages switches
ANS: 2
Question id : 147653 (Correct + 0.83 , Wrong -
0.28)
IP address basically made up of which two parts?1. Host and Server portion 2. Host andNetwork portion 3. Network and Server Portion 4. Network and address portion
ANS: 2
Question id : 147654 (Correct + 0.83 , Wrong -
0.28)
If you use supernet mask 255.255.248.0, how many bits is IP is going to
examine?1. 7 2. 21 3. 14 4. 255
ANS: 2
Question id : 147655 (Correct + 0.83 , Wrong -
0.28)
What does SMTP stands for?1. Simplwe Mail Transaction Protocol 2. Simple Mail Toggle Protocol 3. Simple Mail Traffic Protocol 4. Simple Mail Transfer Protocol
ANS: 4
Question id : 147656 (Correct + 0.83 , Wrong -
0.28)
Convert the following IPv4 address to an IPv6 address : 10.25.135.1231. 0A15:877B 2. 1015:877A 3. 0A15:877A 4. 1015:877B
ANS: 1
Question id : 147657 (Correct + 0.83 , Wrong -
0.28)
NAT application -1. Translate the IP address of the sending host to another IP address 2. Does Encrypt of data stream 3. Does Network Administration 4. Does Decryption of data stream
ANS: 1
Question id : 147658 (Correct + 0.83 , Wrong -
0.28)
ISDN Stands for -1. Internet Digital Service Network 2. Integrated Service Digital Network 3. Integrated Systems Digital Network 4. Integrated Service Digital Naming
ANS: 2
Question id : 147659 (Correct + 0.83 , Wrong -
0.28)
What is the name of the process that TCP uses to setup a connection -1. Three-way handshake 2. Two-way handshake 3. Mono directional connection 4. None of the above
ANS: 1
Question id : 147660 (Correct + 0.83 , Wrong -
0.28)
Which of the following statements is true for fibre optic cable?1. Fibre optic cable transfers data in a mesh 2. Fibre optic cable transfers data in light form 3. Fibre optic cable are similar to coaxial cables 4. None of the above
ANS: 2
Question id : 147661 (Correct + 0.83 , Wrong -
0.28)
How many characters does the hardware address contain?1. 12 hexadecimal characters 2. 32 hexadecimal characters 3. 16 hexadecimal characters 4. 64 hexadecimal characters
ANS: 1
Question id : 147662 (Correct + 0.83 , Wrong -
0.28)
What is the purpose of checksum?1. It verifies the speed of data transfer 2. It verifies that the packet was received correctly 3. It verifies that the connection is stable 4. It verifies that right protocol is used
ANS: 2
Question id : 147663 (Correct + 0.83 , Wrong -
0.28)
What are way(s) to assign IP addresses to hosts?1. Manually 2. Automatically 3. Both above 4. IP cannot be assigned to host
ANS: 3
Question id : 147664 (Correct + 0.83 , Wrong -
0.28)
When does a DHCP client renew the lease of an address?1. After 25 percent of the lease has expired 2. After 50 percent ofthe lease has expired 3. After 75 percent of the lease has expired 4. It never renew the lease
ANS: 2
Question id : 147665 (Correct + 0.83 , Wrong -
0.28)
Which of these is responsible for the connection of Local Area Networks
with Wide Area Networks?1. Hub 2. Bridge 3. Switch 4. Gateway
ANS: 4
Question id : 147666 (Correct + 0.83 , Wrong - 0.28)
Headers of the packet includes -1. Addressing and routing details 2. Network Name 3. Packet Name 4. Packet data contains
ANS: 1
Question id : 147667 (Correct + 0.83 , Wrong -
0.28)
In Circuit-switched network -1. All data in communication takes separate path 2. All data in communication takes same path 3. All data in communication uses different medium to travel 4. None of the above
ANS: 2
Question id : 147668 (Correct + 0.83 , Wrong -
0.28)
What is function of router?1. Packet filtering 2. Path Selection 3. Packet switching 4. All the above
ANS: 4
Question id : 147669 (Correct + 0.83 , Wrong -
0.28)
Which ofthe these can used for Broadband communication channel?1. Coaxial Cable 2. Fibre Optics Cable 3. Microwave circuits 4. All the above
ANS: 4
Question id : 147670 (Correct + 0.83 , Wrong -
0.28)
Ping is -1. Packet InterNet Graber 2. Packet InterNet Groper 3. Packet InterNet Google 4. Packet InterNet Gateway
ANS: 2
Question id : 147671 (Correct + 0.83 , Wrong -
0.28)
What type of query does the client send to the DNS server?1. A recursive query 2. An iterative query 3. A Simple query 4. None of these
ANS: 1
Question id : 147672 (Correct + 0.83 , Wrong -
0.28)
Which application level Protocol run on the top of TCP/IP?1. TELNET 2. FTP 3. SMTP 4. All the above
ANS: 4
Question id : 147673 (Correct + 0.83 , Wrong - 0.28)
The relational model consists of:1. Data redundancy 2. Unorganised data 3. Data in the form of tables 4. Operations using non-SQL languages
ANS: 3
Question id : 147674 (Correct + 0.83 , Wrong -
0.28)
What is overall responsibility of DBA1. Development Operation and maintenance of the database and its applications 2. Create and populate tables 3. Facilitate development of use of database 4. Both 1 and 3
ANS: 4
Question id : 147675 (Correct + 0.83 , Wrong -
0.28)
Which advantages does a Distributed database has over a Centralised
database?1. Slow Response 2. Overall complexity 3. Modular Growth 4. Software Cost
ANS: NOT SURE
Question id : 147676 (Correct + 0.83 , Wrong -
0.28)
Which ofthe following objects make up a relation?1. Data types 2. Tuples 3. Attributes 4. Both 2 and 3
ANS: 4
Question id : 147677 (Correct + 0.83 , Wrong -
0.28)
When user create views, they are part of which schema?1. Virtual 2. Conceptual 3. External 4. Internal
ANS: 3
Question id : 147678 (Correct + 0.83 , Wrong -
0.28)
A Key -1. Can only be one column 2. Identifies a row 3. Must always composed of two or more column 4. Identifies a column
ANS: 2
Question id : 147679 (Correct + 0.83 , Wrong -
0.28)
A stored program that is attached to a table or a view is called?1. Embedded SELECT Statement 2. Trigger 3. System file 4. Virtual file
ANS: 2
Question id : 147680 (Correct + 0.83 , Wrong -
0.28)
Which one of the following is used to limit column values of a table?1. The CHECK constraint 2. The LIMIT constraint 3. The VALUE constraint 4. The SIZE constraint
ANS: 1
Question id : 147681 (Correct + 0.83 , Wrong -
0.28)
When using cursors in embedded SQL, what isthe first step you must take
before you can retrieve data through that cursor?1. Fetch the cursor 2. Declare the cursor 3. Close the cursor 4. Open the cursor
ANS: 4
Question id : 147682 (Correct + 0.83 , Wrong -
0.28)
Locks which are placed by DBMS are called?1. Shared locks 2. Exclusive locks 3. Implicit locks 4. Explicit locks
ANS: 3
Question id : 147683 (Correct + 0.83 , Wrong -
0.28)
Which one is used to sort row in SQL?1. SORT BY 2. GROUP BY 3. ALIGN BY 4. ORDER BY
ANS:4
Question id : 147684 (Correct + 0.83 , Wrong -
0.28)
Which schema objects provide the basic unit of data management in the SQ
environment?1. Views 2. Domains 3. Base Tables 4. Character sets
ANS: 3
Question id : 147685 (Correct + 0.83 , Wrong -
0.28)
Which of the following is correct with respect to ODBMS?1. They are overtaking RDBMS for all applications 2. They have the ability to store complex data types on the web 3. They are most useful for traditional database tables 4. All of the above
ANS: 2
Question id : 147686 (Correct + 0.83 , Wrong -
0.28)
Maintaining a separate copy of the database atmultiple locations is?1. Horizontal Partitioning 2. Data Replication 3. Vertical Partitioning 4. Horizontal and Vertical Partitioning
ANS: 2
Question id : 147687 (Correct + 0.83 , Wrong -
0.28)
Which Statement is correct for Triggers?1. They are not created with SQL 2. They cannot cascade (cause other trigger to fire) 3. Execute against only some applications that access a database 4. They have an event, condition and action
ANS: 4
Question id : 147688 (Correct + 0.83 , Wrong -
0.28)
Out ofthese which one applies to a Class not on Object1. Query 2. Scope 3. Update 4. Constructor
ANS: 4
Question id : 147689 (Correct + 0.83 , Wrong -
0.28)
Wildcard is used in WHERE clause when?1. Exact match is not possible in a SELECT statement 2. Exactmatch is necessary in a CREATE statement 3. Exactmatch is not possible in a CREATE statement 4. Exact match is necessary in a SELECT statement
ANS: 1
Question id : 147690 (Correct + 0.83 , Wrong -
0.28)
Hiding theinternal implementation details of an object is called?1. Polymorphism 2. Inheritance 3. Encapsulation 4. Pseudo Code
ANS: 3
Question id : 147691 (Correct + 0.83 , Wrong -
0.28)
The example ofembedded SQL is -1. Hard Coded SQL statements in a procedure 2. Hard Coded SQL statements in a trigger 3. Hard Coded statement in a program language such as Java 4. The process of making an application capable of generating specific SQL code on fly
ANS: 3
Question id : 147692 (Correct + 0.83 , Wrong -
0.28)
Which one of these disk array type is capable of the fastest read/write
time and most efficient data storage -1. RAID-0 2. RAID-1 3. RAID-2 4. RAID-3
ANS:
Question id : 147693 (Correct + 0.83 , Wrong -
0.28)
Four built-in functions of SQL are -1. COUNT, MIN, MAX, DIV 2. SUM, COUNT, MAX, MIN 3. SUM, MAX, NAME, AVG 4. COUNT, SUM, DIV, AVG
ANS: 2
Question id : 147694 (Correct + 0.83 , Wrong -
0.28)
Problem arising from redundancy are addressed through the process called -1. Data manipulation 2. Fragmentation 3. Decomposition 4. All the above
ANS: 3
Question id : 147695 (Correct + 0.83 , Wrong -
0.28)
GRANT and REVOKE are -1. Mandatory Access Control 2. Discretionary Access Control 3. Database Access Control 4. DBMS Access Control
ANS:2
Question id : 147696 (Correct + 0.83 , Wrong -
0.28)
Advantage(s) of placing computations in SQL views?1. It save users from having to write an expression 2. It ensures results are consistent 3. Both 1 and 2 4. None of the above
ANS: 3
Question id : 147697 (Correct + 0.83 , Wrong -
0.28)
In B+ tree search structure, the leaf node contains1. Search entries 2. Data entries 3. Tree entries 4. All the above
ANS:
Question id : 147698 (Correct + 0.83 , Wrong -
0.28)
RAID Level-1 allows -1. Block-Interleaved Parity 2. Mirroring 3. Strippingand Mirroring 4. Bit-Interleaved Parity
ANS: 2
Question id : 147699 (Correct + 0.83 , Wrong -
0.28)
In RDBMS, relationship between tables are created by using?1. Composite keys 2. Foreign keys 3. Candidate keys 4. Local keys
ANS: 2
Question id : 147700 (Correct + 0.83 , Wrong -
0.28)
Which SQL statement will terminate a transaction?1. SAVEPOINT 2. ROLLBACK 3. COMMIT 4. Both 2 and 3
ANS: 4
Question id : 147701 (Correct + 0.83 , Wrong -
0.28)
Which type of condition join should you use if you want to return
onlymatched rows?1. Inner Join 2. Left Outer Join 3. Right Outer Join 4. Full Outer Join
ANS: 1
Question id : 147702 (Correct + 0.83 , Wrong -
0.28)
Approach(es) to distributed DBMS?1. Client-Server System 2. Collaborating Server 3. Middleware 4. All the above
ANS: 4
Question id : 147703 (Correct + 0.83 , Wrong -
0.28)
Recovery in a distributed DBMS is achieved using?1. Commit Protocol 2. Revoke Protocol 3. Un-Commit Protocol 4. None of the above
ANS: 1
Question id : 147704 (Correct + 0.83 , Wrong -
0.28)
The discretionary access control allows -1. Users to have privileges to access or modify objects in the database 2. Users can grant their privileges to other users 3. Users do not have control over any objects in the database 4. Both 1 and 2
ANS: 4
Question id : 147705 (Correct + 0.83 , Wrong -
0.28)
A Trigger can bedefined on how many tables?1. Only One 2. One of More 3. One to Three 4. Any number of Tables
ANS: 1
Question id : 147706 (Correct + 0.83 , Wrong -
0.28)
Which two operators can you use in a GROUP BY clause toreturn additional
summary data in a query result?1. ROLLUP 2. HAVING 3. CUBE 4. Both 1 to 3
ANS: 4
Question id : 147707 (Correct + 0.83 , Wrong -
0.28)
A DBMS maintains information about the data in a special set of relations
called -1. The Catalog 2. The System Catalog 3. The data dictionary 4. All the above
ANS: 3
Question id : 147708 (Correct + 0.83 , Wrong -
0.28)
SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T, CUSTOMER-ID, NAME, ORDER_ID FROM
CUSTOMER_T, ORDER_T WHERE CUSTOMER_T, CUSTOMER_ID = ORDER_T. CUSTOMER_ID -
Which type of join is this?1. Nature Join 2. Outer Join 3. Equi-Join 4. Cartesian Join
ANS: 3
Question id : 147709 (Correct + 0.83 , Wrong -
0.28)
Locks which are placed by command are known as?1. Implicit locks 2. Explicit locks 3. Exclusive locks 4. Shared locks
ANS: 2
Question id : 147710 (Correct + 0.83 , Wrong -
0.28)
Which qualifier is used to remove duplicate rows from the results of
SELECT statement?1. SINGLE 2. DISTINCT 3. UNIQUE 4. ONLY
ANS: 2
Question id : 147711 (Correct + 0.83 , Wrong -
0.28)
Three Tier architecture consists of -1. Two clients layer and One Server layer 2. Three Server layer 3. A client layer and two server layer 4. Three client layers and three server layer
ANS: 3
Question id : 147712 (Correct + 0.83 , Wrong -
0.28)
Which one is not advantage ofstored procedure -1. Increases network traffic 2. Allows Code sharing 3. Greater security 4. Optimise DBMS
ANS: 1
Question id : 147713 (Correct + 0.83 , Wrong -
0.28)
The language used in application programs to request data from theDBMS is
called1. DML 2. DDL 3. Query Language 4. None of the above
ANS: 1
Question id : 147714 (Correct + 0.83 , Wrong -
0.28)
A recursive relationship is a relationship between an entity and ______1. Itself 2. an intance entity 3. other entity 4. subtype entity
ANS: 1
Question id : 147715 (Correct + 0.83 , Wrong -
0.28)
Which SQL statement below is equivalent to : SELECT NAME FROM EMPLOYEE
WHERE HOMETOWN='KA';1. SELECT NAME IN EMPLOYEE WHERE HOMETOWN IN ('KA'); 2. SELECT NAME IN EMPLOYEE WHERE HOMETOWN = 'KA' 3. SELECT NAME IN EMPLOYEE WHERE HOMETOWN = 'K' 4. SELECT NAME FROM EMPLOYEE WHERE HOMETOWN IN ('KA')
ANS: 4
Question id : 147716 (Correct + 0.83 , Wrong -
0.28)
Which Statement to used to add Schema in SQL environment?1. ADD SCHEMA 2. CREATE SCHEMA 3. INSERT SCHEMA 4. None of these
ANS: 2
Question id : 147717 (Correct + 0.83 , Wrong -
0.28)
Which of the following types of constrains support NOT NULL constraints -1. Table Constraints 2. Column Constraints 3. Domain Constraints 4. Assertions
ANS: 2
Question id : 147718 (Correct + 0.83 , Wrong -
0.28)
On which types of database objects can you assign the TRIGGER privilege?1. Tables 2. Views 3. Columns 4. Domains
ANS: 1
Question id : 147719 (Correct + 0.83 , Wrong -
0.28)
Which set function should you use to add together the values in a column?1. MAX 2. COUNT 3. SUM, MAX, NAME, AVG 4. AVG
ANS: ALL WRONG
Question id : 147720 (Correct + 0.83 , Wrong -
0.28)
Which type of join contains an ON cluase?1. Cross Join 2. Comma-Separated Join 3. Natural Join 4. Condition Join
ANS: 4
Question id : 147721 (Correct + 0.83 , Wrong -
0.28)
Which statement can you use in embedded SQL to privde your host program
with exception and warning information?1. WHENEVER 2. INTO 3. CAST 4. WHENIT
ANS: 1
Question id : 147722 (Correct + 0.83 , Wrong -
0.28)
Which statement do you use to invoke an SQL-invoked procedure?1. RETURN 2. CALL 3. Setup a session 4. DECLARE
ANS: 2
|



whats's about the ambiguous questions ??
ReplyDeleteIs the answer key release by RPSC was final ?? because it had some wrong answer ??