Search Assignments and Papers Here...


Custom Search

Friday, February 8, 2008

Database Management System - 4

LIST OF ATTEMPTED QUESTIONS AND ANSWERS



Multiple Choice Multiple Answer
Question
Security considerations apply to
Correct Answer
users and applications , data, database , dbms
Your Answer
data, database , dbms , users and applications

Select The Blank
Question
________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer
Access control
Your Answer
Access control

Multiple Choice Multiple Answer
Question
Advantages of Database Management System
Correct Answer
Reduced redundancy , Sharing of data , Security
Your Answer
Reduced redundancy , Sharing of data , Security , Work Space required for execution and storage is less

Multiple Choice Multiple Answer
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to select rows from another user's table
Your Answer
The right to connect the database , The right to create table , System programming

True/False
Question
You cannot grant or revoke system privileges to users and roles.
Correct Answer
False
Your Answer
False

True/False
Question
Centralised Database Management cannot support multiple users.
Correct Answer
False
Your Answer
False

Match The Following
Question
Correct Answer
Your Answer
Menu driven interface
Stand alone user
Query language interface
Casual user
DBA
Programming language interface
Application user
Application user
Forms and command code
Parametric user
Storage Manager

Multiple Choice Multiple Answer
Question
Different syntaxes used for update command in SQL are as follows.
Correct Answer
update
set = , update
set = where
Your Answer
update
set = where

Multiple Choice Multiple Answer
Question
Some examples of select command are as following using emp_table
Correct Answer
select * from emp; , select empno,name from emp , select empno,name from emp where salary in(9000,10000);
Your Answer
select * from emp; , select empno,name from emp where salary in(9000,10000);

Multiple Choice Multiple Answer
Question
Strong entities are also called as
Correct Answer
dominant , Parent , owner
Your Answer
dominant , owner

Multiple Choice Multiple Answer
Question
Specify any three string functions used in SQL
Correct Answer
lower(char) , initcap(char) , upper(char)
Your Answer
lower(char) , upper(char) , stringlength(char)

Multiple Choice Single Answer
Question
What will you get when Data items are grouped together.
Correct Answer
Entity
Your Answer
Entity

Select The Blank
Question
A________ mechanism that can be used to provide authorization
Correct Answer
role
Your Answer
role

Multiple Choice Multiple Answer
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to select rows from another user's table
Your Answer
The right to connect the database , The right to create table , The right to select rows from another user's table , System programming

Multiple Choice Single Answer
Question
In order to implement checkpoint the log is checked :
Correct Answer
Backwards
Your Answer
Backwards

Multiple Choice Single Answer
Question
( _ ) stands for
Correct Answer
any single character in character string
Your Answer
any single character in character string

True/False
Question
A role provides authorisation.
Correct Answer
True
Your Answer
True

Select The Blank
Question
Entities are represented in ________in E-R diagram
Correct Answer
Rectangular box
Your Answer
square box

True/False
Question
The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer
False
Your Answer
True

Multiple Choice Single Answer
Question
One method of protecting the privacy and integrity of a system is to place a firewall between internet and
Correct Answer
Public network
Your Answer
intranet

True/False
Question
SQL is low level language
Correct Answer
False
Your Answer
True

True/False
Question
To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer
True
Your Answer
True

Select The Blank
Question
________are binary computer representations of stored logical entities
Correct Answer
Data
Your Answer
Program

Multiple Choice Single Answer
Question
Degree of relationship indicates no of associated -
Correct Answer
Entities
Your Answer
Entities

Multiple Choice Single Answer
Question
To enter new field city in the table 'branch_master' following command is used
Correct Answer
alter table branch_master add(city varchar2(25))
Your Answer
alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer
Question
The set of all relationships of the same type called as
Correct Answer
Relationship set
Your Answer
Relationship set

True/False
Question
In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer
False
Your Answer
False

Select The Blank
Question
UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer
functions
Your Answer
functions

True/False
Question
A role provides authorisation.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Data can be inserted by row in a table following command can be used.
Correct Answer
INSERT
Your Answer
INSERT

Select The Blank
Question
________is a process by which the user's privileges are ascertained
Correct Answer
Authorisation
Your Answer
Authentication

True/False
Question
Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer
False
Your Answer
False

Select The Blank
Question
The information collected in requirement analysis stage is ________for information modeling
Correct Answer
input
Your Answer
input

Multiple Choice Multiple Answer
Question
Attributes are classified as
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued

Multiple Choice Single Answer
Question
In three tier architecture, the layer which provides user interface and interacts with the user is :
Correct Answer
Presentation layer
Your Answer
Presentation layer

Match The Following
Question
Correct Answer
Your Answer
Authorisation
permission given to user
Provide authority
Previlege
Permission for accessing objects
Permission for accessing objects
Role
Provide authority
permission given to user
Integrity
hallmark of data security
hallmark of data security

Multiple Choice Single Answer
Question
Overheads can be reduced by is introducing :
Correct Answer
checkpoints
Your Answer
checkpoints

Multiple Choice Multiple Answer
Question
What are secured using authorisation and access control.
Correct Answer
The intranet , local clients , opearators
Your Answer
The intranet , the internet

Multiple Choice Single Answer
Question
Which type of attribute holds single value for single entity?
Correct Answer
single valued attribute
Your Answer
simple attribute

Select The Blank
Question
________regulates all user access to named objects through privileges
Correct Answer
Discretionary access control
Your Answer
System access control

Multiple Choice Multiple Answer
Question
Which of the following are object oriented features
Correct Answer
Inheritance , Abstraction
Your Answer
Inheritance , Polymerisation

Multiple Choice Multiple Answer
Question
Three levels of database service
Correct Answer
External level , Conceptual level , Physical level
Your Answer
External level , Conceptual level , Physical level

Select The Blank
Question
The most widely used conceptual model is________
Correct Answer
E-R model
Your Answer
E-R model

Select The Blank
Question
A________ mechanism that can be used to provide authorization
Correct Answer
role
Your Answer
role

Select The Blank
Question
A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer
Threat
Your Answer
Threat

True/False
Question
Using database redumdancy can be removed
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
What is alternative name for functions
Correct Answer
methods
Your Answer
programs

0 Comments:

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill
 

Interview Preparation | Placement Papers