IT Trainer Questions


Q:

Data integrity constraints are used to

A) Ensure that duplicate records are not entered into the table B) Prevent users from changing the values stored in the table
C) Control who is allowed access to the data D) Improve the quality of data entered for a specific property like table column
 
Answer & Explanation Answer: D) Improve the quality of data entered for a specific property like table column

Explanation:

Integrity constraints are used to ensure accuracy and consistency of data in a relational database. Data integrity is handled in a relational database through the concept of referential integrity. Many types of integrity constraints play a role in referential integrity (RI).

 

Hence, Data integrity constraints are used to Improve the quality of data entered for a specific property i.e, table column.

Report Error

View Answer Report Error Discuss

0 3086
Q:

Size of the primary memory of a pc ranges between

A) 256 kb to 640 kb B) 64 kb to 256 kb
C) 256 kb to 512 kb D) 2 kb to 8 kb
 
Answer & Explanation Answer: A) 256 kb to 640 kb

Explanation:

Size of the primary memory of a PC ranges between 256 KB to 640 KB.

Report Error

View Answer Report Error Discuss

6 3080
Q:

Which sentence contains an interjection?

A) Hey, where did I park my car! B) Well, that’s a relief.
C) Oh, now I remember where i put my wallet. D) All of the above
 
Answer & Explanation Answer: D) All of the above

Explanation:

Yes, all the above given sentences have an interjection.

 

1. Hey ! is an interjection in the sentence , Hey!, where did I park my car? 

 

2. Well is an interjection in the sentence, Well!, that's a relief.

 

3. Oh! is an interjection in the sentence , Oh!, now I remember where i put my wallet.

Report Error

View Answer Report Error Discuss

Filed Under: English
Exam Prep: AIEEE , Bank Exams , CAT , GATE , GRE , TOEFL
Job Role: Analyst , Bank Clerk , Bank PO , Database Administration , IT Trainer

1 3074
Q:

What belongs to you but is used more by others?

A) Clothes B) Cosmetics
C) Shoes D) Name
 
Answer & Explanation Answer: D) Name

Explanation:

Yep! It's your NAME that belongs to you but is used more by others than you.

Report Error

View Answer Report Error Discuss

9 3057
Q:

Programs stored in ROM are called

A) Firmware B) Software
C) Hardware D) None of above
 
Answer & Explanation Answer: A) Firmware

Explanation:

ROM stands for read-only-memory.

 

It's used to store the start-up instructions for a computer, also known as the firmware.

 

Most modern computers use flash-based ROM. It is part of the BIOS chip, which is located on the motherboard.

Report Error

View Answer Report Error Discuss

4 3057
Q:

What separates the components of a domain name?

A) apostrophes B) periods
C) spaces D) commas
 
Answer & Explanation Answer: B) periods

Explanation:
Report Error

View Answer Report Error Discuss

5 3054
Q:

When do you override hashcode and equals() ?

Answer

HashCode method return int value. So the Hash value is the int value returned by the hash function .


If you want to do equality check or want to use your object as key in HashMap, we must override hashcode and equals() method.

Report Error

View answer Workspace Report Error Discuss

Subject: Java
Job Role: Analyst , IT Trainer

5 3051
Q:

What is an error-first callback ?

Answer

Error-first callbacks are used to pass errors and data as well. You have to pass the error as the first parameter, and it has to be checked to see if something went wrong. Additional arguments are used to pass data.


 


fs.readFile(filePath, function(err, data) {
if (err) {
// handle the error, the return is important here
// so execution stops here
return console.log(err)
}
// use the data object
console.log(data)
})

Report Error

View answer Workspace Report Error Discuss

2 3048