Thursday, May 6, 2010

Database Management System (DBMS) - 10

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

 
 Multiple Choice Multiple Answer
  Question  
Security considerations apply to
  Correct Answer  
users and applications , data, database , dbms
  Your Answer  
data, database , dbms , users and applications

 
 Select The Blank
  Question  
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
  Correct Answer  
Access control
  Your Answer  
Access control

 
 Multiple Choice Multiple Answer
  Question  
Advantages of Database Management System
  Correct Answer  
Reduced redundancy , Sharing of data , Security
  Your Answer  
Reduced redundancy , Sharing of data , Security , Work Space required for
execution and storage is less

 
 Multiple Choice Multiple Answer
  Question  
Which of the following is a database privilege
  Correct Answer  
The right to connect the database , The right to create table , The right to
select rows from another user's table
  Your Answer  
The right to connect the database , The right to create table , System
programming

 
 True/False
  Question  
You cannot grant or revoke system privileges to users and roles.
  Correct Answer  
False
  Your Answer  
False

 
 True/False
  Question  
Centralised Database Management cannot support multiple users.
  Correct Answer  
False
  Your Answer  
False

 
 Match The Following
Question
Correct Answer
Your Answer

Menu driven interface
Stand alone user


Query language interface
Casual user
DBA

Programming language interface
Application user
Application user

Forms and command code
Parametric user
Storage Manager


 
 Multiple Choice Multiple Answer
  Question  
Different syntaxes used for update command in SQL are as follows.
  Correct Answer  
update
set = , update

set = where
  Your Answer  
update
set = where

 
 Multiple Choice Multiple Answer
  Question  
Some examples of select command are as following using emp_table
  Correct Answer  
select * from emp; , select empno,name from emp , select empno,name from emp
where salary in(9000,10000);
  Your Answer  
select * from emp; , select empno,name from emp where salary in(9000,10000);


 
 Multiple Choice Multiple Answer
  Question  
Strong entities are also called as
  Correct Answer  
dominant , Parent , owner
  Your Answer  
dominant , owner

 
 Multiple Choice Multiple Answer
  Question  
Specify any three string functions used in SQL
  Correct Answer  
lower(char) , initcap(char) , upper(char)
  Your Answer  
lower(char) , upper(char) , stringlength(char)

 
 Multiple Choice Single Answer
  Question  
What will you get when Data items are grouped together.
  Correct Answer  
Entity
  Your Answer  
Entity

 
 Select The Blank
  Question  
A________ mechanism that can be used to provide authorization
  Correct Answer  
role
  Your Answer  
role

 
 Multiple Choice Multiple Answer
  Question  
Which of the following is a database privilege
  Correct Answer  
The right to connect the database , The right to create table , The right to
select rows from another user's table
  Your Answer  
The right to connect the database , The right to create table , The right to
select rows from another user's table , System programming

 
 Multiple Choice Single Answer
  Question  
In order to implement checkpoint the log is checked :
  Correct Answer  
Backwards
  Your Answer  
Backwards

 
 Multiple Choice Single Answer
  Question  
( _ ) stands for
  Correct Answer  
any single character in character string
  Your Answer  
any single character in character string

 
 True/False
  Question  
A role provides authorisation.
  Correct Answer  
True
  Your Answer  
True

 
 Select The Blank
  Question  
Entities are represented in ________in E-R diagram
  Correct Answer  
Rectangular box
  Your Answer  
square box

 
 True/False
  Question  
The SSL protocol developed by microsoft corporation, is an industry accepted
standard for network transport layer security
  Correct Answer  
False
  Your Answer  
True

 
 Multiple Choice Single Answer
  Question  
One method of protecting the privacy and integrity of a system is to place a
firewall between internet and
  Correct Answer  
Public network
  Your Answer  
intranet

 
 True/False
  Question  
SQL is low level language
  Correct Answer  
False
  Your Answer  
True

 
 True/False
  Question  
To update city_name to bombay following command is used. UPDATE EMP_TABLE
SET CITY='BOMBAY';
  Correct Answer  
True
  Your Answer  
True

 
 Select The Blank
  Question  
________are binary computer representations of stored logical entities
  Correct Answer  
Data
  Your Answer  
Program

 
 Multiple Choice Single Answer
  Question  
Degree of relationship indicates no of associated -
  Correct Answer  
Entities
  Your Answer  
Entities

 
 Multiple Choice Single Answer
  Question  
To enter new field city in the table 'branch_master' following command is
used
  Correct Answer  
alter table branch_master add(city varchar2(25))
  Your Answer  
alter table branch_master add(city varchar2(25))

 
 Multiple Choice Single Answer
  Question  
The set of all relationships of the same type called as
  Correct Answer  
Relationship set
  Your Answer  
Relationship set

 
 True/False
  Question  
In Database management system, protection includes against hardware and
Software malfunctions and not against unauthorized access.
  Correct Answer  
False
  Your Answer  
False

 
 Select The Blank
  Question  
UML additionaly provide set of ________that can be invoked to compute values
on the basis of attributes of the object
  Correct Answer  
functions
  Your Answer  
functions

 
 True/False
  Question  
A role provides authorisation.
  Correct Answer  
True
  Your Answer  
True

 
 Multiple Choice Single Answer
  Question  
Data can be inserted by row in a table following command can be used.
  Correct Answer  
INSERT
  Your Answer  
INSERT

 
 Select The Blank
  Question  
________is a process by which the user's privileges are ascertained
  Correct Answer  
Authorisation
  Your Answer  
Authentication

 
 True/False
  Question  
Logical 'OR' operator returns true if both component conditions are true
otherwise returns false
  Correct Answer  
False
  Your Answer  
False

 
 Select The Blank
  Question  
The information collected in requirement analysis stage is ________for
information modeling
  Correct Answer  
input
  Your Answer  
input

 
 Multiple Choice Multiple Answer
  Question  
Attributes are classified as
  Correct Answer  
Simple , Composite , Multivalued
  Your Answer  
Simple , Composite , Multivalued

 
 Multiple Choice Single Answer
  Question  
In three tier architecture, the layer which provides user interface and
interacts with the user is :
  Correct Answer  
Presentation layer
  Your Answer  
Presentation layer

 
 Match The Following
Question
Correct Answer
Your Answer

Authorisation
permission given to user
Provide authority

Previlege
Permission for accessing objects
Permission for accessing objects

Role
Provide authority
permission given to user

Integrity
hallmark of data security
hallmark of data security


 
 Multiple Choice Single Answer
  Question  
Overheads can be reduced by is introducing :
  Correct Answer  
checkpoints
  Your Answer  
checkpoints

 
 Multiple Choice Multiple Answer
  Question  
What are secured using authorisation and access control.
  Correct Answer  
The intranet , local clients , opearators
  Your Answer  
The intranet , the internet

 
 Multiple Choice Single Answer
  Question  
Which type of attribute holds single value for single entity?
  Correct Answer  
single valued attribute
  Your Answer  
simple attribute

 
 Select The Blank
  Question  
________regulates all user access to named objects through privileges
  Correct Answer  
Discretionary access control
  Your Answer  
System access control

 
 Multiple Choice Multiple Answer
  Question  
Which of the following are object oriented features
  Correct Answer  
Inheritance , Abstraction
  Your Answer  
Inheritance , Polymerisation

 
 Multiple Choice Multiple Answer
  Question  
Three levels of database service
  Correct Answer  
External level , Conceptual level , Physical level
  Your Answer  
External level , Conceptual level , Physical level

 
 Select The Blank
  Question  
The most widely used conceptual model is________
  Correct Answer  
E-R model
  Your Answer  
E-R model

 
 Select The Blank
  Question  
A________ mechanism that can be used to provide authorization
  Correct Answer  
role
  Your Answer  
role

 
 Select The Blank
  Question  
A________is a situation,event or Personnel that will adversely affect the
database security and the smooth functioning of organization
  Correct Answer  
Threat
  Your Answer  
Threat

 
 True/False
  Question  
Using database redumdancy can be removed
  Correct Answer  
True
  Your Answer  
True

 
 Multiple Choice Single Answer
  Question  
What is alternative name for functions
  Correct Answer  
methods
  Your Answer  
programs

 

No comments:

Post a Comment