ads

How to generate massive web traffic through Social Networking and Bookmarking Sites?

Are you worried about visitors for your sites? 

Do you want lot of web traffic to your sites? 

          If yes, I have given here some secret tips for how to generate massive web traffic rapidly through Social Networking and Bookmarking Sites on free. 

           Since generating more traffic is very difficult task and challenging work for everyone, it can be done by using Social Networking and Bookmarking Sites. You can achieve your goal by utilizing the major Social Networking and Bookmarking Sites like Facebook, Twitter, Google plus, Linkedin, Delicious, Digg, Stumbleupon, Pinterest etc. They can be major traffic sources for your sites. 


     To use those sites, you should register for them and start to make friends, followers and Subscribers.Making friends, followers and subscribers for the social sites is not easy work for newly created accounts. But I have a great way to get subscribers and followers very easily. If you want this you can get it, from here.

           After using the given method you can get lot of subscribers and followers in social Networking sites. Now you have to post article, advertise or share about your site to promote it through these Social sites. From sharing of your article or link posting you can redirect the visitors to yours site. 

         Most of the social sites or Internet marketers go to this step only but up to this is not sufficient utilization of the social networking and bookmarking sites. If you success to share your links or bookmarks through others accounts also, thousands of back-link can be generated for your sites which increases the popularity of the sites and can be generated mass amount of web traffic. But you my asked how are it possible. I know the easiest solution of this also. There is a great online tool which makes this possible; this tool does that work by exchanging the shares between their users. You can get this tool by clicking here for quick sharing and promoting the site on social networking and bookmarking sites. 

           I hope you will be 100% successes for increasing traffic for your site, if you flow thoroughly these tips by me. Please don’t forget to comment it, I will always accept it. 

The list of social bookmarking sites

This summary is not available. Please click here to view the post.

List of High PR directory Submission Sites

Here are the List of Free Submission High PR directory List. Submit on them now and Increase your Site's PR also.
                 Directory URL

  1. scirus.com          Scientific DirectoryFree 
  2. infomine.ucr.edu General directoryFree 
  3. intute.ac.uk         Education DirectoryFree 
  4. ipl.org                General directoryFree 
  5. vlib.org              General directoryFree 
  6. boingboing.net   FreeSubmit website 
  7. bubl.ac.uk         General CatalogueFree 
  8. dmoz.org          General DirectoryFree 
  9. elecdir.com FreeSubmit website
  10. envirolink.org Science and Technology Directory 
  11. freeprwebdirectory.com General directoryFree 
  12. google.com/dirhp General directoryFree 
  13. ilovelanguages.com General directoryFree 
  14. lanic.utexas.edu Latin American DirectoryFree 
  15. musicmoz.org Music DirectoryFree 
  16. sitepromotiondirectory.com General directoryFree 
  17. vos.ucsb.edu Arts Web DirectoryFree 
  18. 123india.com India's directoryFree 
  19. 2rss.com RSS directoryFree 
  20. aboriginalcanada.gc.ca Aboriginal Canada PortalFree 
  21. accesseric.org General directoryFree 
  22. almapubliclibrary.org General directoryFree 
  23. ananzi.co.za African DirectoryFree 
  24. anzwers.com.au Australian & NZ Search DirectoryFree 
  25. archivd.com General directoryFree 
  26. ArtSchools.com Art School DirectoryFree 
  27. atomenabled.org General directoryFree 
  28. bestfreetemplates.org Web Templates DirectoryFree 
  29. cybersleuth-kids.com Kids DirectoryFree 
  30. deca-press.net General directoryFree 
  31. diolead.com General directoryFree 
  32. directory.ac Business DirectoryFree 
  33. femina.com Women's directoryFree 
  34. findtech.com Business directoryFree 
  35. fishlinkcentral.com Aquarium Resources DirectoryFree 
  36. freewebsubmission.com SEO Web DirectoryFree 
  37. glossarist.com Glossaries and Dictionaries dir.Free 
  38. gogreece.com Greek DirectoryFree 
  39. ibeweb.org General directoryFree 
  40. justwebtemplates.com Web Templates DirectoryFree 
  41. kinderstart.com Childish DirectoryFree 
  42. mavensearch.com Jewish Web DirectoryFree 
  43. medicalhealthdirectory.net Medical DirectoryFree, Paid 
  44. movethewebforward.com General directoryFree 
  45. nzs.com New Zealand Web DirectoryFree 
  46. open-site.org Internet EncyclopediaFree 
  47. radwaste.org General directoryFreeSubmit 
  48. reenic.utexas.edu European & Eurasian directoryFree 
  49. scrubtheweb.com General directoryFree 
  50. searchzone.com.au Australia & New Zealand Dir.Free 
  51. sercm.org General directoryFree 
  52. smsweb.org General directoryFree 
  53. somuch.com General directoryFree 
  54. submissionwebdirectory.com General directoryFree 
  55. swoogle.umbc.edu General directoryFree 

How to earn money through website or blog?

            You can earn more and more by displaying advertisements on your sites or blogs which are provided by advertisement collecting and distributing company. When other people visits our sites or blogs and your advertisements, you can get earnings. The amount of earnings depends on your blogs quality and your blogs ranking and promotions.

Pay per click (PPC)is an Internet advertising model used to direct traffic to websites, where advertisers pay the publisher (typically a website owner) when the ad is clicked. With search engines, advertisers typically bid on keyword phrases relevant to their target market. Content sites commonly charge a fixed price per click rather than use a bidding system. PPC "display" advertisements are shown on web sites or search engine results with related content that have agreed to show ads. This approach differs from the "pay per impression" methods used in television and newspaper advertising.

There are so many such PPC advertising sites which are listed below.



1. Google AdSense:is a program run by Google Inc. that allows publishers in the Google Network of content sites to serve automatic text, image, video, and rich media adverts that are targeted to site content and audience. These adverts are administered, sorted, and maintained by Google, and they can generate revenue on per-click or per-impression basis.

2. Yahoo! Publisher: With a wide range of products and a breadth of expertise, Yahoo! offers publishers and companies customized solutions that deliver unmatched monetization for their web sites. Yahoo! has continued to drive the category as a market leader and innovator, with industry-leading distribution and advertiser scale that generate superior network benefits and economics for our partners.

3. Bidvertiser:It is also like Google's AdSense and Overture' Content Match, where neither the advertiser nor the publisher has any control of the advertisements' quality, pricing and timing. Bidvertiser On-Site Bid Per Click offers website owners with the ability to sell their ad space, automatically, to the highest bidder, on a price-per-click basis, where the price is mostly effected by the quality and popularity of their website. Advertisers can place ads directly on sites of their choice and pay only when a visitor clicks-through their site. Bidvertiser serves text ads in all types of standard ad units, including banners, buttons, skyscrapers and inline ads.

Infolinks: Infolinks' suite of ads is part of a welcome revolution - created to monetize sites with reader interests in mind. Infolinks ads help publishers earn money from advertising on content they’re already developing for their site. Infolinks studied the thousands of websites in its database spanning many countries to discover which advertising platforms publishers choose for their sites, and if these combinations truly monetize. So We can place Infolinks ads with google adsense also and all Infolinks publishers implement AdSense ad units on their sites.


5. AdClickMedia: With this advertising site you can monetize from your websites, blogs, & Email Lists instantly. It can connect and serve relevant ads on your web pages that your visitors will find value in, and get paid for each click that you provide our advertisers. It serves various types of ads and channels on our publisher's websites like Photo Text Ads, Banner Display Ads, Full Page Interstitial Ads and Email Pay-Per-Click Ads.

6. Chitika's Advertising: Chitika is the only ad-network which knows when not to show an ad, helping to preserve your user experience. You can also use Chitika Ads with AdSense because Chitika Ads are non-contextual and do not look like AdSense units. Chitika charges advertisers to be featured alongside your site's content. At the end of every month you are paid based on the previous month's earnings (Net 30). Payments are sent after your account earns at least $10.00 (USD) for PayPal payouts or $50.00 (USD) for checks.


How to find the best online Jobs?


How to find the best online Jobs
How to find the best online Jobs. (Photo credit: Wikipedia)



Online jobs are now become more popular for who want to do work and earn from their home. In spite of its popularity due to its increased frauds, it is not easier task to find out the best online job.


Here I have written some important points which should know by the online job seekers.



1) Do not believe the sites, which give the unbelievable skims. i.e. Who says, we can earn thousands of dollars per day.



2) Be careful while participating in the networking affiliates program. Most of such sites takes benefit from their affiliates by promoting their products of selling that to you on high cost or by saying to sell their produce to get the commission but you cannot be benefited from that. So learn more and more about that through it’s about us and FAQ page. You can also ask about that through email or directly by the phone call.



3) Do not participate on those programs that do not use secured transaction method. Participate only on those who use globally certified transaction method.



4) Some of the sites take fees for joining by saying that you can earn thousands of dollars in no time. But after spending your money, you don’t find anything which they said. So be avoiding paying for jobs and try to find such jobs which are free to join. I have also posted about the free to join online jobs.



5) Some of the sites say that they give for only referring their site to other or clicking on their ads or visiting the sites and also say their minimum payout or time limit for payment. But after reached minimum payout or time limit, they don’t give anything to you. So join only on those sites which are most popular and secured.




If you also know about How to find the best online Jobs and which is not mentioned above, you can mention it on the comment section. I always welcomed to you.




Related Posts



What is online job?


English: Woman Data entry clerk entering data ...
What is online job (Photo credit: Wikipedia)

As the meaning of the word “online job” is the work which has to be done on connected to a computer network of accessible by a computer or doing work on a connected database. In which job seeker can earn by doing work at their homes. Online jobs are also called outsourcing jobs.



With the development of the computer and computer technology system day by day increased its use in most of the fields and areas. After development and spreading the use of internet, rapidly promoted the use of computer technology on most of the sectors i.e. government offices, private companies, Industries and other organizations. By increasing the use of computer and its technology along with the internet, it became possible to do work from the remote computers also. Such jobs which are being done from the remote computer by using the internet or network, we called online jobs.



Now a days, such online jobs are became more popular due to its easiness to hire the people for the employers for short or long term work to achieve their company’s goals and to earn by using their skill for job seekers from their home. In spite of their easiness of, there may be possibilities of frauds on it. We have to be careful while searching the online jobs.



So here I have written some best techniques which are to be followed based on my experience on searching online jobs.



Solved MCQ of C set-1


1. C language has been developed by
A) Martin Richards
B) Bijarne Stroustrup
C) Dennis Ritche
D) Ken Thompson

2. int[ ] ={5,6,7,8,9} What is the value of a[3]?
A) 9
B) 8
C) 7
D) 6


3. C can be used on
A) Only MS-Dos operating System
B) Only Linux operating system
C) Only Windows operating system
D) All of the above


4. Float a[15], what is the size of array?
A) 17
B) 14
C) 15
D) 16

5. C programs are converted into machine language with the help of
A) An Editor
B) A complier
C) An operating system
D) None of the above

6. Array is
A) Primary data type
B) Pointer data type
C) Heterogeneous data type
D) Homogenous data type

7. Which of the following is allowed in a C Arithmetic Instruction?
A) [ ]
B) { }
C) ( )
D) None of the above

8. To accept 100 different values into the array we require
A) Loop
B) If condition
C) Function
D) Structure

9. If a is an integer variable, a=7/3; will return a value
A) 2.5
B) 3
C) 0
D) 2

10. Pointer holds
A) Value of variable
B) Address of variable
C) Value and address of variable
D) Always null

Answers:
1. C) Dennis Ritche
2. B) 8
3. D) All of the above
4. C) 15
5. B) A complier
6. D) Homogenous data type
7. C) ( )
8. A) Loop
9. D) 2
10. B) Address of variable

You Might also view the following Related Posts

Solved MCQ of Basic of IT Set-1


1. Binary code "0" means ............
A) State of absence
B) State of presence
C) State of Negative
D) State of Positive

2. ............. is compulsory part of HTML.
A) <br>
B) <body>
C) <tr>
D) <img>

3. CAI stands for ................
A) Computer Aided Instruction
B) Computer Aided information
C) Cost Added Information
D) Computer Aided Infrastructure

4. Maximum font size in HTML is ...........
A) 6
B) 7
C) 5
D) 8

5. MICR reader is an ............... device.
A) Input
B) Output
C) Electric
D) Storage

6. Internet is .................
A) Network of Networks
B) Networks of Communication
C) Networks of Data
D) Group of LAN

7. ................. is a standalone tag.
A) <img>
B) <body>
C) <head>
D) <p>

8. FTP stands for
A) Folder Transfer Protocol
B) File Transfer Process
C) File Transfer Protocol
D) File Text Protocol

9. Hexadecimal number system has ..............base.
A) 16
B) 14
C) 12
D) 08

10. HTML stands for
A) Hypertext Mass up language
B) Hypertext Markup language
C) Hypertext Move up language
D) Hypertext Mark of language

Answers: 
1. A) State of absence
2. B) <body>
3. B) Computer Aided information
4. B) 7
5. A) Input  
6. A) Network of Networks
7. A) <img>
8. C) File Transfer Protocol
9. A) 16
10.B) Hypertext Markup language 

MCQ of C++ with answer Set-2


1. The ……………. Operator is known as insertion operator.
A) >>
B) >
C) <<
D) <

2. State True or False.
i) A satic function can have access to only other static members (functions or variables) declared in the same class.
ii) A static member function can be called using the class name (instead of its objects)
A) True, True
B) True, False
C) False, True
D) False, False

3. Which of the following condition is true for an object used as a function argument?
i) A copy of the entire objects is passed to the function.
ii) Only the address of the object is transferred to the function.
A) Only i
B) Only ii
C) Both i and ii
D) None of them


4. …………… enable us to hide, inside the object, both the data fields and the methods that act on that data.
A) Encapsulation
B) Polymorphism
C) Inheritance
D) Overloading

5. Which of the following is/ are the characteristics of friend function.
A) It is not in the scope of the class to which it has been declared as friend.
B) It can invoke like a normal function without the help of any object.
C) Usually, it has the objects as arguments.
D) All of the above.

6. The dereferencing operator ………….. is used to access a member when we use pointers to both the object and the member.
A) ->*
B) .*
C) Any of the above
D) None of the above

7. A ………………. Is a class whose instances themselves are classes.
A) Subclass
B) Abstract Class
C) Meta Class
D) Object Class

8. The dereferencing operator ……… is used when the object itself is used width in the member pointer.
A) ->*
B) .*
C) Any of the above
D) None of the above

9. A constructor that accepts no parameters is called the ……………….
A) Paramless constructor
B) No parameter constructor
C) Default constructor
D) Argumentless constructor

10. Automatic initialization of object is carried out using a special member function called …………
A) Friend
B) Casting
C) Reference Parameter
D) Constructor

11. Which of the following characteristics of constructor are true.
i) They should be declared in the public section.
ii) They are invoked automatically when the objects are created.
iii) They do not have return type and void also.
iv) We cannot refer their address.
v) Constructors cannot virtual.
A) Only i, ii, iii and v
B) Only ii, iii, iv, and v
C) Only i, iii, iv and v
D) All i, ii, iii, iv and v

12. A ……………. takes a reference to an object of the same class as itself as an argument.
A) Reference constructor
B) Copy Constructor
C) Self Constructor
D) None of the above

13. State True or False
i) A destructor never takes any argument nor does it return any value.
ii) It releases memory space for future use.
A) True, True
B) True, False
C) False, True
D) False, False

14. Which of the following operates cannot be overloaded?
i) Size of operator (sizeof)            ii) Scope resolution Operator
iii) Conditional operator (?:)        iv) Assignment Operator (=)
A) i, ii, iii only
B) ii, iii, iv only
C) i, iii, iv only
D) all i, ii, iii, iv

15. …………. Is the process of creating new classes, called derived classes from existing classes called base class.
A) Inheritance
B) Encapsulation
C) Polymorphism
D) Overloading

16. State True or False.
i) While overloading operators new operator can be overloaded.
ii) The binary operator such as +, -, * and must explicitly return a value.
A) True, True
B) True, False
C) False, True
D) False, False

17. ………… function writes a string of text to a window.
A) cputs ()
B) put ()
C) gets ()
D) tputs ()

18. Which of the following condition (s) should satisfy the casting operator.
i) It must be a class member.
ii) It must not satisfy a return type.
iii) It must have any arguments.
iv) All of the above.

19. Find the Hierarchy of Data Types.
i) Long double   ii) Double             iii) Float                                iv) Long                                v) Int         vi) Char
A) 1-2-3-4-5-6
B) 1-3-2-4-5-6
C) 1-2-3-5-4-6
D) 1-2-4-3-5-6

20. ………….. function sets the fill pattern and color.
A) floodfill ()
B) setcolor()
C) setfillstyle()
D) fillstyle ()

 Answers:
1.       C) <<
2.       B) True, False
3.       C) Both i and ii
4.       A) Encapsulation
5.       D) All of the above.
6.       A) ->*
7.       C) Meta Class
8.       B) .*
9.       C) Default constructor
10.   D) Constructor
11.   D) All i, ii, iii, iv and v
12.   B) Copy Constructor
13.   A) True, True
14.   A) i, ii, iii only
15.   A) Inheritance
16.   C) False, True
17.   A) cputs ()
18.   iv) All of the above.
19.   A) 1-2-3-4-5-6
20.   C) setfillstyle()


You might also view the following related posts
For other more posts: Click Here

Solved MCQ of Data Structure Set-2


1. A directed graph is ………………. if there is a path from each vertex to every other vertex in the digraph.

A) Weakly connected

B) Strongly Connected

C) Tightly Connected

D) Linearly Connected



2. In the …………….. traversal we process all of a vertex’s descendents before we move to an adjacent vertex.

A) Depth First

B) Breadth First

C) With First

D) Depth Limited



3. State True of False.

i) Network is a graph that has weights or costs associated with it.

ii) An undirected graph which contains no cycles is called a forest.

iii) A graph is said to be complete if there is no edge between every pair of vertices.

A) True, False, True

B) True, True, False

C) True, True, True

D) False, True, True



4. Match the following.

a) Completeness          i) How long does it take to find a solution
b) Time Complexity    ii) How much memory need to perform the search.
c) Space Complexity  iii) Is the strategy guaranteed to find the solution when there in one.

A) a-iii, b-ii, c-i

B) a-i, b-ii, c-iii

C) a-iii, b-i, c-ii

D) a-i, b-iii, c-ii



5. The number of comparisons done by sequential search is ………………

A) (N/2)+1

B) (N+1)/2

C) (N-1)/2

D) (N+2)/2



6. In ……………, search start at the beginning of the list and check every element in the list.

A) Linear search

B) Binary search

C) Hash Search

D) Binary Tree search



7. State True or False.

i) Binary search is used for searching in a sorted array.

ii) The time complexity of binary search is O(logn).

A) True, False

B) False, True

C) False, False

D) True, True



8. Which of the following is not the internal sort?

A) Insertion Sort

B) Bubble Sort

C) Merge Sort

D) Heap Sort



9. State True or False.

i) An undirected graph which contains no cycles is called forest.

ii) A graph is said to be complete if there is an edge between every pair of vertices.

A) True, True

B) False, True

C) False, False

D) True, False



10. A graph is said to be ……………… if the vertices can be split into two sets V1 and V2 such there are no edges between two vertices of V1 or two vertices of V2.

A) Partite

B) Bipartite

C) Rooted

D) Bisects



11. In a queue, the initial values of front pointer f rare pointer r should be …….. and ……….. respectively.

A) 0 and 1

B) 0 and -1

C) -1 and 0

D) 1 and 0



12. In a circular queue the value of r will be ..

A) r=r+1

B) r=(r+1)% [QUEUE_SIZE – 1]

C) r=(r+1)% QUEUE_SIZE

D) r=(r-1)% QUEUE_SIZE



13. Which of the following statement is true?

i) Using singly linked lists and circular list, it is not possible to traverse the list backwards.

ii) To find the predecessor, it is required to traverse the list from the first node in case of singly linked list.

A) i-only

B) ii-only

C) Both i and ii

D) None of both



14. The advantage of …………….. is that they solve the problem if sequential storage representation. But disadvantage in that is they are sequential lists.

A) Lists

B) Linked Lists

C) Trees

D) Queues




15. What will be the value of top, if there is a size of stack STACK_SIZE is 5

A) 5

B) 6

C) 4

D) None




16. ………… is not the operation that can be performed on queue.

A) Insertion

B) Deletion

C) Retrieval

D) Traversal




17. There is an extra element at the head of the list called a ……….

A) Antinel

B) Sentinel

C) List header

D) List head




18. A graph is a collection of nodes, called ………. And line segments called arcs or ……….. that connect pair of nodes.

A) vertices, edges

B) edges, vertices

C) vertices, paths

D) graph node, edges




19. A ……….. is a graph that has weights of costs associated with its edges.

A) Network

B) Weighted graph

C) Both A and B

D) None A and B



20. In general, the binary search method needs no more than ……………. comparisons.

A) [log2n]-1

B) [logn]+1

C) [log2n]

D) [log2n]+1



View Answers:



1. B) Strongly Connected

2. A) Depth First

3. B) True, True, False

4. C) a-iii, b-i, c-ii

5. B) (N+1)/2

6. A) Linear search

7. D) True, True

8. C) Merge Sort

9. A) True, True10. B) Bipartite

11. B) 0 and -1

12. C) r=(r+1)% QUEUE_SIZE

13. C) Both i and ii

14. B) Linked Lists

15. C) 4

16. D) Traversal

17. B) Sentinel

18. A) vertices, edges

19. C) Both A and B
20. D) [log2n]+1

 Related posts:

        For more Multiple Choice Questions(MCQs): Click Here

        Solved MCQ of Database Management System (DBMS) Set - 3


        1. State true or false.
        i) Select operator is not a unary operator.
        ii) Project operator chooses subset of attributes or columns of a relation.

        A) i-True, ii-False

        B) i-True, ii-True

        C) i-False, ii-True

        D) i-False, ii-False


        2. …………… database is used as template for all databases created.

        A) Master

        B) Model

        C) Tempdb

        D) None of the above


        3. One aspect that has to be dealt with by the integrity subsystem is to ensure that only valid values can be assigned to each data items. This is referred to as

        A) Data Security

        B) Domain access

        C) Data Control

        D) Domain Integrity


        4. ………………….. operator is basically a join followed by a project on the attributes of first relation.

        A) Join

        B) Semi-Join

        C) Full Join

        D) Inner Join


        5. Which of the following is not a binary operator in relational algebra?

        A) Join

        B) Semi-Join

        C) Assignment

        D) Project


        6. Centralizing the integrity checking directly under the DBMS ………….. Duplication and ensures the consistency and validity of the database.

        A) Increases

        B) Skips

        C) Does not reduce

        D) Reduces


        7. Which of the following is/are the DDL statements?

        A) Create

        B) Drop

        C) Alter

        D) All of the above


        8. In snapshot, …………………. clause tells oracle how long to wait between refreshes.

        A) Complete

        B) Force

        C) Next

        D) Refresh


        9. ……………… defines rules regarding the values allowed in columns and is the standard mechanism for enforcing database integrity.

        A) Column

        B) Constraint

        C) Index

        D) Trigger


        10. For like predicate which of the following is true.
        i) % matches zero of more characters.
        ii) _ matches exactly one character.

        A) i-only

        B) ii-only

        C) Both of them

        D) None of them


        Answers:

        1. C) i-False, ii-True
        2. B) Model
        3. D) Domain Integrity
        4. B) Semi-Join
        5. D) Project
        6. D) Reduces
        7. D) All of the above
        8. D) Refresh
        9. B) Constraint
        10. C) Both of them


        Related Posts

        For other more Multiple Choice Questions (MCQs): Click Here

        Solved MCQ of Database Management System (DBMS) Set - 2


        1. The candidate key is that you choose to identify each row uniquely is called ……………..

        A) Alternate Key

        B) Primary Key

        C) Foreign Key

        D) None of the above


        2. …………….. is used to determine whether of a table contains duplicate rows.

        A) Unique predicate

        B) Like Predicate

        C) Null predicate

        D) In predicate


        3. To eliminate duplicate rows ……………… is used

        A) NODUPLICATE

        B) ELIMINATE

        C) DISTINCT

        D) None of these


        4. State true or false

        i) A candidate key is a minimal super key.

        ii) A candidate key can also refer to as surrogate key.

        A) i-true, ii-false

        B) i-false, ii-true

        C) i-true, ii-true

        D) i-false, ii-false


        5. DCL stands for

        A) Data Control Language

        B) Data Console Language

        C) Data Console Level

        D) Data Control Level


        6. …………………… is the process of organizing data into related tables.

        A) Normalization

        B) Generalization

        C) Specialization

        D) None of the above


        7. A ………………. Does not have a distinguishing attribute if its own and mostly are dependent entities, which are part of some another entity.

        A) Weak entity

        B) Strong entity

        C) Non attributes entity

        D) Dependent entity


        8. …………….. is the complex search criteria in the where clause.

        A) Sub string

        B) Drop Table

        C) Predict

        D) Predicate


        9. ………………… is preferred method for enforcing data integrity

        A) Constraints

        B) Stored Procedure

        C) Triggers

        D) Cursors


        10. The number of tuples in a relation is called its …………. While the number of attributes in a relation is called it’s ………………..

        A) Degree, Cardinality

        B) Cardinality, Degree

        C) Rows, Columns

        D) Columns, Rows


        11) The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is

        A. Procedural DML

        B. Non-Procedural DML

        C. Procedural DDL

        D. Non-Procedural DDL


        12) Which two files are used during operation of the DBMS?

        A. Query languages and utilities

        B. DML and query language

        C. Data dictionary and transaction log

        D. Data dictionary and query language


        13) The database schema is written in

        A. HLL

        B. DML

        C. DDL

        D. DCL


        14) The way a particular application views the data from the database that the application uses is a

        A. module

        B. relational model

        C. schema

        D. sub schema


        15) The relational model feature is that there

        A. is no need for primary key data

        B. is much more data independence than some other database models

        C. are explicit relationships among records.

        D. are tables with many dimensions


        16) Which one of the following statements is false?

        A. The data dictionary is normally maintained by the database administrator

        B. Data elements in the database can be modified by changing the data dictionary.

        C. The data dictionary contains the name and description of each data element.

        D. The data dictionary is a tool used exclusively by the database administrator.


        17) Which of the following are the properties of entities?

        A. Groups

        B. Table

        C. Attributes

        D. Switchboards


        18) Which database level is closest to the users?

        A. External

        B. Internal

        C. Physical

        D. Conceptual


        19) Which are the two ways in which entities can participate in a relationship?

        A. Passive and active

        B. Total and partial

        C. Simple and Complex

        D. All of the above


        20) ........ data type can store unstructured data

        A. RAW

        B. CHAR

        C. NUMERIC

        D. VARCHAR

        Answers:


        1. B. Primary Key
        2. A. Unique predicate
        3. C. DISTINCT
        4. C. i-true, ii-true
        5. A. Data Control Language
        6. A. Normalization
        7. A. Weak entity
        8. D. Predicate
        9. A. Constraints
        10. B. Cardinality, Degree
        11. B. Non-Procedural DML
        12.C. Data dictionary and transaction log
        13. C. DDL
        14. D. sub schema
        15. B. is much more data independence than some other database models
        16. B. Data elements in the database can be modified by changing the data dictionary.
        17. C. Attributes
        18. A. External
        19. B. Total and partial
        20. A. RAW


        Related Posts

        For other more Multiple Choice Questions (MCQs): Click Here