Computer Knowledge
Aptitude · Reasoning · English · CS — Corporate & Campus Interview Prep
94 Questions 5 Topics Take Test
Advertisement
Showing 91–94 of 94 questions
Q.91 Easy Database/SQL
In SQL, what does the GROUP BY clause do?
A Joins multiple tables
B Aggregates rows into groups based on specified columns
C Deletes duplicate records
D Orders results alphabetically
Correct Answer:  B. Aggregates rows into groups based on specified columns
Explanation:

GROUP BY groups rows with identical values in specified columns, used with aggregate functions like COUNT(), SUM().

Take Test
Q.92 Easy Database/SQL
In a relational database, which normal form eliminates partial dependencies and is considered essential for most practical database designs?
A Second Normal Form (2NF)
B Third Normal Form (3NF)
C Boyce-Codd Normal Form (BCNF)
D Fourth Normal Form (4NF)
Correct Answer:  B. Third Normal Form (3NF)
Explanation:

3NF eliminates partial and transitive dependencies, making it the standard for practical database design. BCNF is stricter but 3NF is the most commonly implemented normalization form.

Take Test
Q.93 Easy Database/SQL
Which of the following is a characteristic of NoSQL databases that makes them suitable for handling big data in cloud environments?
A Strict ACID compliance across all nodes
B Horizontal scalability and schema-less design
C Requirement for predefined schemas before insertion
D Complex JOIN operations for data retrieval
Correct Answer:  B. Horizontal scalability and schema-less design
Explanation:

NoSQL databases like MongoDB and Cassandra are designed for horizontal scaling and flexible schemas, making them ideal for cloud-based big data applications with varying data structures.

Take Test
Q.94 Easy Database/SQL
Which of the following represents a vulnerability in SQL query construction that can be exploited through malicious user input, and can be prevented using parameterized queries?
A Buffer overflow attacks
B Cross-site scripting (XSS)
C SQL injection attacks
D Distributed denial of service (DDoS)
Correct Answer:  C. SQL injection attacks
Explanation:

SQL injection occurs when untrusted input is concatenated into SQL queries. Parameterized queries/prepared statements separate code from data, preventing attackers from modifying query logic.

Take Test
IGET
iget AI
Online · Ask anything about exams
Hi! 👋 I'm your iget AI assistant.

Ask me anything about exam prep, MCQ solutions, study tips, or strategies! 🎯
UPSC strategy SSC CGL syllabus Improve aptitude NEET Biology tips