Aspire's Library

A Place for Latest Exam wise Questions, Videos, Previous Year Papers,
Study Stuff for MCA Examinations

CUET UG Computer Science Information Practices Previous Year Questions (PYQs)

CUET UG Computer Science Information Practices Database Management Systems PYQ


CUET UG Computer Science Information Practices PYQ
In SQL, LIKE condition allows you to use wildcard characters to perform matching. Which of the following is a valid wildcard character?





Go to Discussion

CUET UG Computer Science Information Practices CUET UG PYQ CUET UG Computer Science Information Practices COMPUTER SCIENCE INFORMATICS PRACTICES 2022 PYQ

Solution

In SQL, the LIKE operator is used for pattern matching with wildcard characters:

  • % → Matches any sequence of characters (including zero characters).

  • _ → Matches exactly one character.

Example:

SELECT * FROM Students WHERE Name LIKE 'A%';

This will return all names starting with ‘A’ (like Amit, Anita, Arun, etc.).


CUET UG Computer Science Information Practices PYQ
Match List I with List II
List I List II
A. Data redundancy I. Updating the structure of a data file requires modifying all application programs accessing the file
B. Data inconsistency II. Duplication of data at different places (files)
C. Data isolation III. Separation of resource or data modification made by different transactions
D. Data dependency IV. Mismatch of data maintained at different places





Go to Discussion

CUET UG Computer Science Information Practices CUET UG PYQ CUET UG Computer Science Information Practices COMPUTER SCIENCE INFORMATICS PRACTICES 2022 PYQ

Solution

List I (Concept) Matched With (List II) Explanation
A. Data Redundancy II. Duplication of data at different places (files) Data redundancy occurs when the same data is stored in multiple files or locations, leading to unnecessary duplication and wasted storage space.
B. Data Inconsistency IV. Mismatch of data maintained at different places When data is redundant and one copy is updated but others are not, inconsistencies occur — resulting in mismatched or unreliable data.
C. Data Isolation III. Separation of resource or data modification made by different transactions In file systems, data is often scattered across different files, making it difficult to access or modify related information simultaneously. This problem is known as data isolation.
D. Data Dependency I. Updating the structure of a data file requires modification in all application programs accessing the file Data dependency means that the data structure and application programs are tightly coupled. Any change in file structure requires modification in all programs that use it.


CUET UG Computer Science Information Practices


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

CUET UG Computer Science Information Practices


Online Test Series,
Information About Examination,
Syllabus, Notification
and More.

Click Here to
View More

Ask Your Question or Put Your Review.

loading...