Monday, February 4, 2008

Database Management System - 2

LIST OF ATTEMPTED QUESTIONS AND ANSWERS



True/False
Question
Encryption alone is sufficient to secure the data.
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
Which attribute holds multiple values for single entity?
Correct Answer
Multi valued attribute
Your Answer
Multi valued attribute

Select The Blank
Question
________ is one closest to the users.
Correct Answer
Logical level
Your Answer
Physical level

True/False
Question
All views are not updatable.
Correct Answer
True
Your Answer
False

Multiple Choice Single Answer
Question
(%) stands for :-
Correct Answer
Sequence of n characters in character string
Your Answer
Sequence of n characters in character string

True/False
Question
Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer
False
Your Answer
False

True/False
Question
Structural constraints are specified to force the placement of information into structures.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Immediate database modification uses :-
Correct Answer
Old Value & New Value
Your Answer
Only New Value

True/False
Question
Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer
True
Your Answer
True

Select The Blank
Question
________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
Correct Answer
Program operation independence
Your Answer
Program operation independence

Multiple Choice Multiple Answer
Question
Attributes are classified as :-
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued , Variant

Multiple Choice Single Answer
Question
Security issues become more complex in which environment?
Correct Answer
Network
Your Answer
Network

Multiple Choice Multiple Answer
Question
Set operators are as follows :-
Correct Answer
UNION , INTERSECT , MINUS
Your Answer
UNION , INTERSECT , MINUS

Multiple Choice Single Answer
Question
What will you get when Data items are grouped together?
Correct Answer
Entity
Your Answer
Data

Multiple Choice Multiple Answer
Question
The ICAM studies created lot of graphical methods for defining :-
Correct Answer
Functions , Data structures
Your Answer
Functions , Combinations , Data structures , Conditions

True/False
Question
The information collected during requirement analysis forms input for information modeling.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Security considerations apply to :-
Correct Answer
Data, database , DBMS , Users and applications
Your Answer
Users and applications , Variant , Data, database , DBMS

Multiple Choice Multiple Answer
Question
Specify any three string functions used in SQL :-
Correct Answer
initcap(char) , upper(char) , lower(char)
Your Answer
lower(char) , initcap(char) , upper(char) , stringlength(char)

Match The Following
Question
Correct Answer
Your Answer
select * from
order by

Views all columns in sorting ording by specified column_name
Views all columns in reverse order

Select * from
View all data from table.
Views all column satisfying condition in where clause

select , from


Views 2 specified column from table
Updates records which satisfy condition

select * from where
Views all column satisfying condition in where clause
Views all columns in sorting ording by specified column_name

Multiple Choice Multiple Answer
Question
Write the attributes of entity "book" :-
Correct Answer
Book_no , Book_name , Price
Your Answer
Book , Book_no , Book_name , Price

Select The Blank
Question
Database design model helps in improving________.
Correct Answer
Maintainability
Your Answer
Maintainability

Select The Blank
Question
The program which allows multiple users and programs to access the database concurrently is called ________ a database.
Correct Answer
Sharing
Your Answer
Sharing

Multiple Choice Single Answer
Question
If a data transfer failure is detected the system involves :-
Correct Answer
Recovery procedure
Your Answer
Check points

Multiple Choice Multiple Answer
Question
To be able to successfully design and maintain databases we have to do following :-
Correct Answer
Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer
Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary

True/False
Question
Wait-die scheme is based on preemptive technique.
Correct Answer
False
Your Answer
True

Multiple Choice Single Answer
Question
Backbone of any organization is :-
Correct Answer
Information
Your Answer
Information

Select The Blank
Question
A ________ is a database that can maintain information such as video, images, sounds in traditional form.
Correct Answer
Universal server
Your Answer
Server

Select The Blank
Question
An alternative technique to log based crash recovery is ________.
Correct Answer
Shadow Paging
Your Answer
Backup Mechanism

Select The Blank
Question
File is collection of ________.
Correct Answer
Records
Your Answer
Records

Multiple Choice Multiple Answer
Question
Some clauses of Revoke command are as follows :-
Correct Answer
FROM , ON
Your Answer
FROM , ON , ANY , MANY

Multiple Choice Single Answer
Question
Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
Correct Answer
Single valued
Your Answer
Single valued

Multiple Choice Multiple Answer
Question
Different E-R modeling styles are :-
Correct Answer
Rein 85 , IDEFIX , Crow's foot
Your Answer
Crow's foot , Rein 85 , IDEFIX , Functions

Multiple Choice Multiple Answer
Question
Reasons of creation of views are :-
Correct Answer
When data security is required , When data redundancy is to be kept to minimum.
Your Answer
When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required

Select The Blank
Question
Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
Correct Answer
Character string data types
Your Answer
Character string data types

Multiple Choice Multiple Answer
Question
The front end of database consists of tools such as :-
Correct Answer
Forms , Query evaluators , Graphical user interfaces
Your Answer
Forms , Query evaluators , Report writers , Graphical user interfaces

Select The Blank
Question
________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
Correct Answer
Security
Your Answer
Security

Multiple Choice Multiple Answer
Question
What are secured using authorization and access control?
Correct Answer
The intranet , Local clients , Operators
Your Answer
The intranet , Local clients , Operators , The internet

Multiple Choice Single Answer
Question
When two entities are associated then the relationship which exists is called :-
Correct Answer
Binary relationship
Your Answer
Quarterly relationship

Multiple Choice Single Answer
Question
Shadow paging technique maintains two pages during the life time of a transaction namely :-
Correct Answer
Current page & Shadow page
Your Answer
Current page & Shadow page

Multiple Choice Single Answer
Question
Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer
CURE
Your Answer
SERE

True/False
Question
A fully developed data model includes domains for each attribute in the E-R model.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Which of the following term means that the data model is not specific to any particular application?
Correct Answer
Sharebillity
Your Answer
Structured validity

Match The Following
Question
Correct Answer
Your Answer
DBA
Data base administrator
Data base administrator
UML
Unified modeling language
Unified modeling language
DBMS
Data base management system
Data base management system
RDBMS
Relational DBMS
Relational DBMS

True/False
Question
If attribute is multi-valued then single lines are used.
Correct Answer
False
Your Answer
True

Select The Blank
Question
In________there is no security of data.
Correct Answer
DBMS
Your Answer
RDBMS

Select The Blank
Question
________ is a process by which user's identity is checked.
Correct Answer
Authentication
Your Answer
Authentication

True/False
Question
If attribute is derived dotted line is used.
Correct Answer
True
Your Answer
True

No comments:

Post a Comment