True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question Which attribute holds multiple values for single entity?
Correct Answer Multi valued attribute
Your Answer Multi valued attribute
Select The Blank
Question ________ is one closest to the users.
Correct Answer Logical level
Your Answer Physical level
True/False
Question All views are not updatable.
Correct Answer True
Your Answer False
Multiple Choice Single Answer
Question (%) stands for :-
Correct Answer Sequence of n characters in character string
Your Answer Sequence of n characters in character string
True/False
Question Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer False
Your Answer False
True/False
Question Structural constraints are specified to force the placement of information into structures.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Immediate database modification uses :-
Correct Answer Old Value & New Value
Your Answer Only New Value
True/False
Question Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer True
Your Answer True
Select The Blank
Question ________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
Correct Answer Program operation independence
Your Answer Program operation independence
Multiple Choice Multiple Answer
Question Attributes are classified as :-
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued , Variant
Multiple Choice Single Answer
Question Security issues become more complex in which environment?
Correct Answer Network
Your Answer Network
Multiple Choice Multiple Answer
Question Set operators are as follows :-
Correct Answer UNION , INTERSECT , MINUS
Your Answer UNION , INTERSECT , MINUS
Multiple Choice Single Answer
Question What will you get when Data items are grouped together?
Correct Answer Entity
Your Answer Data
Multiple Choice Multiple Answer
Question The ICAM studies created lot of graphical methods for defining :-
Correct Answer Functions , Data structures
Your Answer Functions , Combinations , Data structures , Conditions
True/False
Question The information collected during requirement analysis forms input for information modeling.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Security considerations apply to :-
Correct Answer Data, database , DBMS , Users and applications
Your Answer Users and applications , Variant , Data, database , DBMS
Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL :-
Correct Answer initcap(char) , upper(char) , lower(char)
Your Answer lower(char) , initcap(char) , upper(char) , stringlength(char)
Match The Following
Question Correct Answer Your Answer
select * from 
order by 
Views all columns in sorting ording by specified column_name	Views all columns in reverse order
Select * from View all data from table. Views all column satisfying condition in where clause
select , from
Views 2 specified column from table Updates records which satisfy condition
select * from where Views all column satisfying condition in where clause Views all columns in sorting ording by specified column_name
 
 
 Multiple Choice Multiple Answer
  Question  	Write the attributes of entity "book" :-
  Correct Answer  	Book_no , Book_name , Price 
  Your Answer  	Book , Book_no , Book_name , Price 
 
 
 Select The Blank
  Question  	Database design model helps in improving________.
  Correct Answer  	Maintainability
  Your Answer  	Maintainability
 
 
 Select The Blank
  Question  	The program which allows multiple users and programs to access the database concurrently is called ________ a database.
  Correct Answer  	Sharing
  Your Answer  	Sharing
 
 
 Multiple Choice Single Answer
  Question  	If a data transfer failure is detected the system involves :-
  Correct Answer  	Recovery procedure
  Your Answer  	Check points
 
 
 Multiple Choice Multiple Answer
  Question  	To be able to successfully design and maintain databases we have to do following :-
  Correct Answer  	Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary 
  Your Answer  	Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary 
 
 
 True/False
  Question  	Wait-die scheme is based on preemptive technique.
  Correct Answer  	False
  Your Answer  	True
 
 
 Multiple Choice Single Answer
  Question  	Backbone of any organization is :-
  Correct Answer  	Information
  Your Answer  	Information
 
 
 Select The Blank
  Question  	A ________ is a database that can maintain information such as video, images, sounds in traditional form.
  Correct Answer  	Universal server
  Your Answer  	Server
 
 
 Select The Blank
  Question  	An alternative technique to log based crash recovery is ________.
  Correct Answer  	Shadow Paging
  Your Answer  	Backup Mechanism
 
 
 Select The Blank
  Question  	File is collection of ________.
  Correct Answer  	Records
  Your Answer  	Records
 
 
 Multiple Choice Multiple Answer
  Question  	Some clauses of Revoke command are as follows :-
  Correct Answer  	FROM , ON 
  Your Answer  	FROM , ON , ANY , MANY 
 
 
 Multiple Choice Single Answer
  Question  	Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
  Correct Answer  	Single valued
  Your Answer  	Single valued
 
 
 Multiple Choice Multiple Answer
  Question  	Different E-R modeling styles are :-
  Correct Answer  	Rein 85 , IDEFIX , Crow's foot 
  Your Answer  	Crow's foot , Rein 85 , IDEFIX , Functions 
 
 
 Multiple Choice Multiple Answer
  Question  	Reasons of creation of views are :-
  Correct Answer  	When data security is required , When data redundancy is to be kept to minimum. 
  Your Answer  	When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required 
 
 
 Select The Blank
  Question  	Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
  Correct Answer  	Character string data types
  Your Answer  	Character string data types
 
 
 Multiple Choice Multiple Answer
  Question  	The front end of database consists of tools such as :-
  Correct Answer  	Forms , Query evaluators , Graphical user interfaces 
  Your Answer  	Forms , Query evaluators , Report writers , Graphical user interfaces 
 
 
 Select The Blank
  Question  	________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
  Correct Answer  	Security
  Your Answer  	Security
 
 
 Multiple Choice Multiple Answer
  Question  	What are secured using authorization and access control?
  Correct Answer  	The intranet , Local clients , Operators 
  Your Answer  	The intranet , Local clients , Operators , The internet 
 
 
 Multiple Choice Single Answer
  Question  	When two entities are associated then the relationship which exists is called :-
  Correct Answer  	Binary relationship
  Your Answer  	Quarterly relationship
 
 
 Multiple Choice Single Answer
  Question  	Shadow paging technique maintains two pages during the life time of a transaction namely :-
  Correct Answer  	Current page & Shadow page
  Your Answer  	Current page & Shadow page
 
 
 Multiple Choice Single Answer
  Question  	Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
  Correct Answer  	CURE
  Your Answer  	SERE
 
 
 True/False
  Question  	A fully developed data model includes domains for each attribute in the E-R model.
  Correct Answer  	True
  Your Answer  	True
 
 
 Multiple Choice Single Answer
  Question  	Which of the following term means that the data model is not specific to any particular application?
  Correct Answer  	Sharebillity
  Your Answer  	Structured validity
 
 
 Match The Following
Question	Correct Answer	Your Answer
DBA Data base administrator Data base administrator
UML Unified modeling language Unified modeling language
DBMS Data base management system Data base management system
RDBMS Relational DBMS Relational DBMS
 
 
 True/False
  Question  	If attribute is multi-valued then single lines are used.
  Correct Answer  	False
  Your Answer  	True
 
 
 Select The Blank
  Question  	In________there is no security of data.
  Correct Answer  	DBMS
  Your Answer  	RDBMS
 
 
 Select The Blank
  Question  	________ is a process by which user's identity is checked.
  Correct Answer  	Authentication
  Your Answer  	Authentication
 
 
 True/False
  Question  	If attribute is derived dotted line is used.
  Correct Answer  	True
  Your Answer  	True
No comments:
Post a Comment