Leetcoaching in GCC(for polytechnic Diploma Students)
4.15K subscribers
1.26K photos
14 videos
1.06K files
2.02K links
GCC MOTIVE- TOP GOVT.COLLEGE AFTER DIPLOMA FOR B.TECH |WHAT AFTER DIPLOMA/POLYTECHNIC-JOIN GCC FOR PERFECT GUIDANCE DIPLOMA
GCC Main Branch Address A-12, First Floor, G.T.K ROAD,100 NO.BUS STAND, Adarsh Nagar metro station www.leetcoaching.com@8744886600
Download Telegram
4. Which of the following functions are valid functions for string manipulation in SQL?  

(A) Itrim()   (B) Icase()   (C) mid()   (D) power()
Anonymous Quiz
11%
(1) (A), (B) and (D) only
57%
(2) (A), (B) and (C) only
19%
(3) (A), (B), (C) and (D)
12%
(4) (B), (C) and (D) only
10. The result of which join is equivalent to the Cartesian product?
Anonymous Quiz
23%
(1) Natural Join
50%
(2) Cross Join
22%
(3) Inner Join
5%
(4) Outer Join
11. A network in which every computer is capable of playing the role of a client, or a server, or both, at the same time is called
Anonymous Quiz
56%
(1) Peer-to-Peer Network
18%
(2) Local Area Network
15%
(3) Dedicated Server Network
11%
(4) Wide Area Network
12. In ____ topology, each device is connected to every other device on the network through a dedicated point-to-point link.
Anonymous Quiz
36%
(1) Ring
17%
(2) Tree
16%
(3) Bus
31%
(4) Mesh
👍2
13. A program is given to read data from the "CUET.TXT" file and display the result on the screen.  

(A) data = fout.read()   (B) fout.close()   (C) print(data)   (D) fout = open("CUET.TXT", "r")
Anonymous Quiz
9%
(1) (D), (B), (A), (C)
29%
(2) (A), (C), (B), (D)
18%
(3) (B), (A), (D), (C)
45%
(4) (D), (A), (C), (B)
👍1
14. ____ is used to physically identify a machine on the network.
Anonymous Quiz
45%
(1) IP address
42%
(2) MAC address
10%
(3) Port Address
3%
(4) URL
15. If we want to delete all records of a table without deleting its structure, then which SQL command is used?
Anonymous Quiz
34%
(1) drop
46%
(2) delete
12%
(3) modify
9%
(4) alter
Which of the following is/are the characteristic(s) of a Relational Database Management System (RDBMS)?

(A) Complex to implement (B) Data is stored in tables (C) Supports SQL (D) Multi-user access
Anonymous Quiz
14%
(1) (A) and (B) only
58%
(2) (B), (C) and (D) only
15%
(3) (A), (C) and (D) only
12%
(4) (A), (B), (C) and (D)
Which of the following come(s) under Data Manipulation Language (DML)?

(A) SELECT (B) UPDATE (C) CREATE (D) INSERT
Anonymous Quiz
14%
(1) (A), (B) and (C) only
55%
(2) (A), (B) and (D) only
12%
(3) (A) and (D) only
19%
(4) (A), (B), (C) and (D)
Which of the following is/are the valid attribute type(s) in SQL?

(A) CHAR (B) DATE (C) FLOAT (D) BOOLEAN
Anonymous Quiz
12%
(1) (A) and (B) only
33%
(2) (A), (B) and (C) only
34%
(3) (A), (C) and (D) only
21%
(4) (A), (B), (C) and (D)
Which of the following statement is/are correct about the degree of a relation?

(A) Number of attributes in the relation (B) Number of tuples in the relation (C) Number of constraints in the relation (D) Number of keys in the relation
Anonymous Quiz
23%
(1) (A) only
32%
(2) (B) only
39%
(3) (A) and (C) only
6%
(4) (C) and (D) only
👍2
Which of the following is NOT a type of network topology?
Anonymous Quiz
8%
(1) Star
64%
(2) Circle
13%
(3) Bus
14%
(4) Mesh
The protocol used for secure web browsing is
Anonymous Quiz
36%
(1) HTTP
10%
(2) FTP
11%
(3) TCP/IP
42%
(4) HTTPS
YOUTUBE LIVE @7:30 MILTE AA JAO DOSTO LIVE 15-20 MIN KE LIYE
1