Data Definition Language (DDL)
Data Definition Language (DDL)
Data Definition Language (DDL)
9. State true or false. !=, <>, ^= all denote the same operation.
True
10. What are the privileges that can be granted on a table by a user to
others?
Insert, update, delete, select, references, index, execute, alter, all
11. What command is used to get back the privileges offered by the
GRANT command?
REVOKE
20. Which date function is used to find the difference between two
dates?
MONTHS_BETWEEN
23. What is the use of the DROP option in the ALTER TABLE
command?
It is used to drop constraints specified on the table.
24. What is the value of ‘comm’ and ‘sal’ after executing the following
query if the initial value of ‘sal’ is 10000?
UPDATE EMP SET SAL = SAL + 1000, COMM = SAL*0.1;
sal = 11000, comm = 1000
27. Which function is used to find the largest integer less than or equal
to a specific value?
FLOOR
SQL – QUERIES
I. SCHEMAS
Table 1 : STUDIES
Table 2 : SOFTWARE
Table 3 : PROGRAMMER
LEGEND :
QUERIES :
KEYS:
II . SCHEMA :
Table 1 : DEPT
Table 2 : EMP
MGR is the empno of the employee whom the employee reports to.
DEPTNO is a foreign key.
QUERIES
1. List all the employees who have at least one person reporting to
them.
2. List the employee details if and only if more than 10 employees are
present in department no 10.
3. List the name of the employees with their immediate higher
authority.
4. List all the employees who do not manage any one.
5. List the employee details whose salary is greater than the lowest
salary of an employee belonging to deptno 20.
6. List the details of the employee earning more than the highest paid
manager.
7. List the highest salary paid for each job.
8. Find the most recently hired employee in each department.
9. In which year did most people join the company? Display the year
and the number of employees.
10. Which department has the highest annual remuneration bill?
11. Write a query to display a ‘*’ against the row of the most recently
hired employee.
12. Write a correlated sub-query to list out the employees who earn
more than the average salary of their department.
13. Find the nth maximum salary.
14. Select the duplicate records (Records, which are inserted, that
already exist) in the EMP table.
15. Write a query to list the
* COMPUTER NETWORKS *
1. What are the two types of transmission technology available?
(i) Broadcast and (ii) point-to-point
2. What is subnet?
A generic term for section of a large networks usually separated by
a bridge or router.
5. What is SAP?
Series of interface points that allow other computers to
communicate with the other layers of network protocol stack.
9. What is Beaconing?
The process that allows a network to self-repair networks
problems. The stations on the network notify the other stations on the ring
when they are not receiving the transmissions. Beaconing is used in Token
ring and FDDI networks.
* ORACLE *
Questions:
How to change UserID and Password in Oracle.
what are differenct types of joins. explain outer join.
How to print output in Oracle.
what is a data control component.
why do we use DBMS ?
what are logical objects in RDBMS (tables & views).
what do you know about IDL?
can we maintain mirror data in different databases.
Data Integrity constraint is
(a)to ensure the presence of primary key
What is indexing in databases?
What is atomicity?
What is DBMS and RDBMS ?
types of DBMS,queries
what is a cursor
types of cursors
normalization
normal forms
what is an os
Types of joins ?
what is a trigger ?
initialize the cursor with the OPEN statement, which identifies the active
set.
Then, you use the FETCH statement to retrieve the first row.
You can execute FETCH repeatedly until all rows have been
retrieved.
DECLARE
CURSOR c1 IS SELECT ename FROM emp;
name1 emp.ename%TYPE;
name2 emp.ename%TYPE;
name3 emp.ename%TYPE;
BEGIN
OPEN c1;
FETCH c1 INTO name1; -- this fetches first row
FETCH c1 INTO name2; -- this fetches second row
FETCH c1 INTO name3; -- this fetches third row
...
* OPERATING SYSTEMS *
Following are a few basic questions that cover the essentials of OS:
4. What is thrashing?
It is a phenomenon in virtual memory schemes when the processor
spends most of its time swapping pages, rather than executing instructions.
This is due to an inordinate number of page faults.
20. Define latency, transfer and seek time with respect to disk I/O.
Seek time is the time required to move the disk arm to the required
track. Rotational delay or latency is the time it takes for the beginning of
the required sector to reach the head. Sum of seek time (if any) and
latency is the access time. Time taken to actually transfer a span of data is
transfer time.
23. How are the wait/signal operations for monitor different from those
for semaphores?
If a process in a monitor signal and no task is waiting on the
condition variable, the signal is lost. So this allows easier program design.
Whereas in semaphores, every operation affects the value of the
semaphore, so the wait and signal operations should be perfectly balanced
in the program.
30. What are the four layers that Windows NT have in order to achieve
independence?
Hardware abstraction layer
Kernel
Subsystems
System Services.
32. What are the key object oriented concepts used by Windows NT?
Encapsulation
Object class and instance