Friday, May 22, 2009

Database Management System - 8

LIST OF ATTEMPTED QUESTIONS AND ANSWERS


True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question Which attribute holds multiple values for single entity?
Correct Answer Multi valued attribute
Your Answer Multi valued attribute


Select The Blank
Question ________ is one closest to the users.
Correct Answer Logical level
Your Answer Physical level


True/False
Question All views are not updatable.
Correct Answer True
Your Answer False


Multiple Choice Single Answer
Question (%) stands for :-
Correct Answer Sequence of n characters in character string
Your Answer Sequence of n characters in character string


True/False
Question Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer False
Your Answer False


True/False
Question Structural constraints are specified to force the placement of information into structures.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Immediate database modification uses :-
Correct Answer Old Value & New Value
Your Answer Only New Value


True/False
Question Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer True
Your Answer True


Select The Blank
Question ________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
Correct Answer Program operation independence
Your Answer Program operation independence


Multiple Choice Multiple Answer
Question Attributes are classified as :-
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued , Variant


Multiple Choice Single Answer
Question Security issues become more complex in which environment?
Correct Answer Network
Your Answer Network


Multiple Choice Multiple Answer
Question Set operators are as follows :-
Correct Answer UNION , INTERSECT , MINUS
Your Answer UNION , INTERSECT , MINUS


Multiple Choice Single Answer
Question What will you get when Data items are grouped together?
Correct Answer Entity
Your Answer Data


Multiple Choice Multiple Answer
Question The ICAM studies created lot of graphical methods for defining :-
Correct Answer Functions , Data structures
Your Answer Functions , Combinations , Data structures , Conditions


True/False
Question The information collected during requirement analysis forms input for information modeling.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Security considerations apply to :-
Correct Answer Data, database , DBMS , Users and applications
Your Answer Users and applications , Variant , Data, database , DBMS


Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL :-
Correct Answer initcap(char) , upper(char) , lower(char)
Your Answer lower(char) , initcap(char) , upper(char) , stringlength(char)


Match The Following
Question Correct Answer Your Answer

select * from
order by
Views all columns in sorting ording by specified column_name Views all columns in reverse order

Select * from View all data from table. Views all column satisfying condition in where clause

select , from

Views 2 specified column from table Updates records which satisfy condition

select * from where Views all column satisfying condition in where clause Views all columns in sorting ording by specified column_name



Multiple Choice Multiple Answer
Question Write the attributes of entity "book" :-
Correct Answer Book_no , Book_name , Price
Your Answer Book , Book_no , Book_name , Price


Select The Blank
Question Database design model helps in improving________.
Correct Answer Maintainability
Your Answer Maintainability


Select The Blank
Question The program which allows multiple users and programs to access the database concurrently is called ________ a database.
Correct Answer Sharing
Your Answer Sharing


Multiple Choice Single Answer
Question If a data transfer failure is detected the system involves :-
Correct Answer Recovery procedure
Your Answer Check points


Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following :-
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary


True/False
Question Wait-die scheme is based on preemptive technique.
Correct Answer False
Your Answer True


Multiple Choice Single Answer
Question Backbone of any organization is :-
Correct Answer Information
Your Answer Information


Select The Blank
Question A ________ is a database that can maintain information such as video, images, sounds in traditional form.
Correct Answer Universal server
Your Answer Server


Select The Blank
Question An alternative technique to log based crash recovery is ________.
Correct Answer Shadow Paging
Your Answer Backup Mechanism


Select The Blank
Question File is collection of ________.
Correct Answer Records
Your Answer Records


Multiple Choice Multiple Answer
Question Some clauses of Revoke command are as follows :-
Correct Answer FROM , ON
Your Answer FROM , ON , ANY , MANY


Multiple Choice Single Answer
Question Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
Correct Answer Single valued
Your Answer Single valued


Multiple Choice Multiple Answer
Question Different E-R modeling styles are :-
Correct Answer Rein 85 , IDEFIX , Crow's foot
Your Answer Crow's foot , Rein 85 , IDEFIX , Functions


Multiple Choice Multiple Answer
Question Reasons of creation of views are :-
Correct Answer When data security is required , When data redundancy is to be kept to minimum.
Your Answer When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required


Select The Blank
Question Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
Correct Answer Character string data types
Your Answer Character string data types


Multiple Choice Multiple Answer
Question The front end of database consists of tools such as :-
Correct Answer Forms , Query evaluators , Graphical user interfaces
Your Answer Forms , Query evaluators , Report writers , Graphical user interfaces


Select The Blank
Question ________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
Correct Answer Security
Your Answer Security


Multiple Choice Multiple Answer
Question What are secured using authorization and access control?
Correct Answer The intranet , Local clients , Operators
Your Answer The intranet , Local clients , Operators , The internet


Multiple Choice Single Answer
Question When two entities are associated then the relationship which exists is called :-
Correct Answer Binary relationship
Your Answer Quarterly relationship


Multiple Choice Single Answer
Question Shadow paging technique maintains two pages during the life time of a transaction namely :-
Correct Answer Current page & Shadow page
Your Answer Current page & Shadow page


Multiple Choice Single Answer
Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer CURE
Your Answer SERE


True/False
Question A fully developed data model includes domains for each attribute in the E-R model.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Which of the following term means that the data model is not specific to any particular application?
Correct Answer Sharebillity
Your Answer Structured validity


Match The Following
Question Correct Answer Your Answer

DBA Data base administrator Data base administrator

UML Unified modeling language Unified modeling language

DBMS Data base management system Data base management system

RDBMS Relational DBMS Relational DBMS



True/False
Question If attribute is multi-valued then single lines are used.
Correct Answer False
Your Answer True


Select The Blank
Question In________there is no security of data.
Correct Answer DBMS
Your Answer RDBMS


Select The Blank
Question ________ is a process by which user's identity is checked.
Correct Answer Authentication
Your Answer Authentication


True/False
Question If attribute is derived dotted line is used.
Correct Answer True
Your Answer True

No comments:

Search Assignments and Papers Here...


Custom Search

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill