MEDIUM
HSSC Clerk
IMPORTANT
Earn 100

A NF relation is converted to BCNF by:
(a)removing composite keys
(b)removing multivalued dependencies
(c)dependent attributes of overlapping composite keys are put in a separate relation.
(d)dependent non-key attributes are put in a separate table
(e)none of these

50% studentsanswered this correctly

Important Questions on Practice Sets
MEDIUM
HSSC Clerk
IMPORTANT
A balanced order- multi-way search tree in which each non-root node contains at least _____ keys is called a B-tree of order

MEDIUM
HSSC Clerk
IMPORTANT
Logical access security could be compromised by various elements of a computer system. Which one of the following could make system insecure:

MEDIUM
HSSC Clerk
IMPORTANT
Access control procedure provides for access rights administration by the security administrator and is authorised by:

MEDIUM
HSSC Clerk
IMPORTANT
User identification technique that uses reference profiles is:

HARD
HSSC Clerk
IMPORTANT
The following program (myprog) is run from the command line as my prog what would be the output?
main (int argc, char argv [ ])
{
int i, j=;
for (i=; i<argc; i)
{
j=j+atoi (argv[i]);
printf("d",j);
}
}

MEDIUM
HSSC Clerk
IMPORTANT
A relationship between processes such that each has some part which must not be executed while the critical section of another is being executed, is known as:

MEDIUM
HSSC Clerk
IMPORTANT
Hamming codes are used for error detection and correction. If the minimum hamming distance is then the number of errors correctable is:

HARD
HSSC Clerk
IMPORTANT
'Each packet contains the full source and destination address.' This statement indicates which of the following?
