True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question Which attribute holds multiple values for single entity?
Correct Answer Multi valued attribute
Your Answer Multi valued attribute
Select The Blank
Question ________ is one closest to the users.
Correct Answer Logical level
Your Answer Physical level
True/False
Question All views are not updatable.
Correct Answer True
Your Answer False
Multiple Choice Single Answer
Question (%) stands for :-
Correct Answer Sequence of n characters in character string
Your Answer Sequence of n characters in character string
True/False
Question Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer False
Your Answer False
True/False
Question Structural constraints are specified to force the placement of information into structures.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Immediate database modification uses :-
Correct Answer Old Value & New Value
Your Answer Only New Value
True/False
Question Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer True
Your Answer True
Select The Blank
Question ________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
Correct Answer Program operation independence
Your Answer Program operation independence
Multiple Choice Multiple Answer
Question Attributes are classified as :-
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued , Variant
Multiple Choice Single Answer
Question Security issues become more complex in which environment?
Correct Answer Network
Your Answer Network
Multiple Choice Multiple Answer
Question Set operators are as follows :-
Correct Answer UNION , INTERSECT , MINUS
Your Answer UNION , INTERSECT , MINUS
Multiple Choice Single Answer
Question What will you get when Data items are grouped together?
Correct Answer Entity
Your Answer Data
Multiple Choice Multiple Answer
Question The ICAM studies created lot of graphical methods for defining :-
Correct Answer Functions , Data structures
Your Answer Functions , Combinations , Data structures , Conditions
True/False
Question The information collected during requirement analysis forms input for information modeling.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Security considerations apply to :-
Correct Answer Data, database , DBMS , Users and applications
Your Answer Users and applications , Variant , Data, database , DBMS
Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL :-
Correct Answer initcap(char) , upper(char) , lower(char)
Your Answer lower(char) , initcap(char) , upper(char) , stringlength(char)
Match The Following
Question Correct Answer Your Answer
select * from
order by
Views all columns in sorting ording by specified column_name Views all columns in reverse order
Select * from View all data from table. Views all column satisfying condition in where clause
select , from
Views 2 specified column from table Updates records which satisfy condition
select * from where Views all column satisfying condition in where clause Views all columns in sorting ording by specified column_name
Multiple Choice Multiple Answer
Question Write the attributes of entity "book" :-
Correct Answer Book_no , Book_name , Price
Your Answer Book , Book_no , Book_name , Price
Select The Blank
Question Database design model helps in improving________.
Correct Answer Maintainability
Your Answer Maintainability
Select The Blank
Question The program which allows multiple users and programs to access the database concurrently is called ________ a database.
Correct Answer Sharing
Your Answer Sharing
Multiple Choice Single Answer
Question If a data transfer failure is detected the system involves :-
Correct Answer Recovery procedure
Your Answer Check points
Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following :-
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
True/False
Question Wait-die scheme is based on preemptive technique.
Correct Answer False
Your Answer True
Multiple Choice Single Answer
Question Backbone of any organization is :-
Correct Answer Information
Your Answer Information
Select The Blank
Question A ________ is a database that can maintain information such as video, images, sounds in traditional form.
Correct Answer Universal server
Your Answer Server
Select The Blank
Question An alternative technique to log based crash recovery is ________.
Correct Answer Shadow Paging
Your Answer Backup Mechanism
Select The Blank
Question File is collection of ________.
Correct Answer Records
Your Answer Records
Multiple Choice Multiple Answer
Question Some clauses of Revoke command are as follows :-
Correct Answer FROM , ON
Your Answer FROM , ON , ANY , MANY
Multiple Choice Single Answer
Question Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
Correct Answer Single valued
Your Answer Single valued
Multiple Choice Multiple Answer
Question Different E-R modeling styles are :-
Correct Answer Rein 85 , IDEFIX , Crow's foot
Your Answer Crow's foot , Rein 85 , IDEFIX , Functions
Multiple Choice Multiple Answer
Question Reasons of creation of views are :-
Correct Answer When data security is required , When data redundancy is to be kept to minimum.
Your Answer When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required
Select The Blank
Question Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
Correct Answer Character string data types
Your Answer Character string data types
Multiple Choice Multiple Answer
Question The front end of database consists of tools such as :-
Correct Answer Forms , Query evaluators , Graphical user interfaces
Your Answer Forms , Query evaluators , Report writers , Graphical user interfaces
Select The Blank
Question ________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
Correct Answer Security
Your Answer Security
Multiple Choice Multiple Answer
Question What are secured using authorization and access control?
Correct Answer The intranet , Local clients , Operators
Your Answer The intranet , Local clients , Operators , The internet
Multiple Choice Single Answer
Question When two entities are associated then the relationship which exists is called :-
Correct Answer Binary relationship
Your Answer Quarterly relationship
Multiple Choice Single Answer
Question Shadow paging technique maintains two pages during the life time of a transaction namely :-
Correct Answer Current page & Shadow page
Your Answer Current page & Shadow page
Multiple Choice Single Answer
Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer CURE
Your Answer SERE
True/False
Question A fully developed data model includes domains for each attribute in the E-R model.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Which of the following term means that the data model is not specific to any particular application?
Correct Answer Sharebillity
Your Answer Structured validity
Match The Following
Question Correct Answer Your Answer
DBA Data base administrator Data base administrator
UML Unified modeling language Unified modeling language
DBMS Data base management system Data base management system
RDBMS Relational DBMS Relational DBMS
True/False
Question If attribute is multi-valued then single lines are used.
Correct Answer False
Your Answer True
Select The Blank
Question In________there is no security of data.
Correct Answer DBMS
Your Answer RDBMS
Select The Blank
Question ________ is a process by which user's identity is checked.
Correct Answer Authentication
Your Answer Authentication
True/False
Question If attribute is derived dotted line is used.
Correct Answer True
Your Answer True
No comments:
Post a Comment