Search Assignments and Papers Here...


Custom Search

Monday, February 4, 2008

Database Management System - 3

DATABASE MANAGEMENT SYSTEMS

Multiple Choice Multiple Answer
Question Following date formats used in oracle
Correct Answer TO_CHAR() , TO_DATE()
Your Answer TO_DATE()

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Identify relationship between objects , Data dictionary

True/False
Question The data in the database cannot be shared
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation
Correct Answer Functional dependency
Your Answer Functional dependency

Multiple Choice Single Answer
Question When an attribute composed of multiple components, each with an independent existence is called as
Correct Answer composite attribute
Your Answer composite attribute

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer True

Match The Following
Question Correct Answer Your Answer

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool box developers


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char)

Multiple Choice Single Answer
Question One method of protecting the privacy and integrity of a system is to place a firewall between internet and
Correct Answer Public network
Your Answer intranet

True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True

Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer False

True/False
Question The shadow page table is never changed over the duration of the transaction
Correct Answer True
Your Answer True

True/False
Question The Database administrator cannot grant or revoke privileges to users.
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question Write a command to grant all privileges on BOOK TABLE to user "Mathews"
Correct Answer GRANT ALL ON BOOK TO MATHEWS
Your Answer GRANT ALL ON BOOK TO MATHEWS

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question Write SQL statement, which shows contents of table book, whose price is less than 4000 and more than 1000
Correct Answer select * from book where price>1000 and price<4000
Your Answer select * from book where price>1000 and price<4000

Multiple Choice Multiple Answer
Question There are two kinds of tables -
Correct Answer base tables , views
Your Answer base tables , system

Match The Following
Question Correct Answer Your Answer

Integrity hallmark of data security hallmark of data security

Authorisation permission given to user Provide authority

Previlege Permission for accessing objects permission given to user

Role Provide authority Permission for accessing objects

True/False
Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Specify any 2 forms of insert command
Correct Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE
Your Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE

Multiple Choice Multiple Answer
Question Following are properties of roles allowed for easier privilege management
Correct Answer Reduced privilege administration , Dynamic privilege administration , application awareness
Your Answer Dynamic privilege administration , Deletion of information

Multiple Choice Multiple Answer
Question Strong entities are also called as
Correct Answer dominant , Parent , owner
Your Answer Parent

True/False
Question A user can grant any object privilege on any object he or she owns to any other user or role
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Security considerations apply to
Correct Answer data, database , dbms , users and applications
Your Answer data, database , dbms , users and applications

Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control

True/False
Question Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer True
Your Answer True

Multiple Choice Single Answer
Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer CURE
Your Answer RE

True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Your Answer False

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DBMS

Multiple Choice Multiple Answer
Question A Database Management System has several subsystems
Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem
Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem

Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer functions

Select The Blank
Question In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language
Correct Answer ANSI American national std institute
Your Answer ANSI American national std institute

Multiple Choice Multiple Answer
Question The different types of database users
Correct Answer Security officers , Database administrators , Network administrators
Your Answer Database administrators , Database operators

Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Relation

Multiple Choice Single Answer
Question Access to a database can be controlled using
Correct Answer Access Privilages
Your Answer Access control

Select The Blank
Question Structctural validity in data modeling means ________
Correct Answer consistency
Your Answer consistency

Select The Blank
Question ________ is tailored to specific DBMS system
Correct Answer Physical design
Your Answer Physical design

Multiple Choice Single Answer
Question In an Entity relationship diagram total participation of an entity in a relationship set is indicated by :
Correct Answer Double line
Your Answer Double ellipse

Multiple Choice Multiple Answer
Question The ICAM studies created lot of graphical methods for defining
Correct Answer Functions , Data structures
Your Answer Data structures

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Multiple Choice Single Answer
Question Write the use of UPDATE command
Correct Answer To change or to modify data values in table
Your Answer To change or to modify data values in table

Select The Blank
Question ________published the paper "Relational Model of Data for Large Shared Data Banks "
Correct Answer F.Codd
Your Answer F.Codd

Select The Blank
Question Database design model helps in improving________
Correct Answer maintainability
Your Answer maintainability

Multiple Choice Multiple Answer
Question SSL protocol provides
Correct Answer authorisation , data encryption , data integrity
Your Answer authorisation , data encryption , security

True/False
Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer True
Your Answer False

Multiple Choice Single Answer
Question Class room entity has single value for room_no attribute so room_no attriute is reffered to as
Correct Answer Single valued
Your Answer Single valued

Multiple Choice Single Answer
Question Which type of attribute represents a value that is derivable from the value of related attribute
Correct Answer derived attribute
Your Answer derived attribute

Multiple Choice Multiple Answer
Question Some clauses of Revoke command are as follows
Correct Answer FROM , ON
Your Answer FROM , ON , ANY

Select The Blank
Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer Threat
Your Answer Threat

Multiple Choice Single Answer
Question In an Entity relationship diagram, what is used to link attributes to entity sets and entity sets to relationships?
Correct Answer Line
Your Answer Line

Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Multiple Choice Single Answer
Question (%) stands for
Correct Answer Sequence of n characters in character string
Your Answer Sequence of n characters in character string

Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Match The Following
Question Correct Answer Your Answer

Menu driven interface Stand alone user Stand alone user

Query language interface Casual user Casual user

Programming language interface Application user DBA

Forms and command code Parametric user Parametric user

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DML

Multiple Choice Multiple Answer
Question Which of the following are valid SQL commands.
Correct Answer ALTER , UPDATE
Your Answer ALTER , UPDATE

Select The Blank
Question ________is a process by which user's identity is checked
Correct Answer Authentication
Your Answer Authentication

Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer square box

Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer Data

Multiple Choice Single Answer
Question WWW stands for
Correct Answer World wide web
Your Answer World wide web

Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model

Select The Blank
Question ________provides a graphical means of modeling various components of software system
Correct Answer UML
Your Answer ERD

True/False
Question SQL is low level language
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

True/False
Question Centralised Database Management cannot support multiple users.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer security , Integrity constraints , Database triggers

True/False
Question Unary operator operates only on one operand.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question In a two tier architecture, the software components are distributed over which two systems
Correct Answer Client , Server
Your Answer Client , Server

True/False
Question Temporal constraints can be used to limit the value of a particular attribute to be in a range
Correct Answer False
Your Answer True

Multiple Choice Multiple Answer
Question Write the attributes of entity "book"
Correct Answer book_no , Book_name , Price
Your Answer book_no , Book_name , Price

Multiple Choice Multiple Answer
Question Set operators are as follows
Correct Answer MINUS , UNION , INTERSECT
Your Answer UNION , INTERSECT , MINUS

Multiple Choice Multiple Answer
Question Three levels of database service
Correct Answer External level , Conceptual level , Physical level
Your Answer External level , Conceptual level , Internal level

Match The Following
Question Correct Answer Your Answer

Data model must know entities,relation,attributes database characteristics

shareability optimal data model's characteristics used in physical modeling

E-R model widely used conceptual model widely used conceptual model

Database design conversion into computer usable form must know entities,relation,attributes

True/False
Question Codd developed E-R model
Correct Answer False
Your Answer False

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Multiple Choice Multiple Answer
Question The levels of abstraction of data are
Correct Answer Physical level , Logical level , View level
Your Answer Physical level , Logical level

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question An example of non-volatile storage is :
Correct Answer Magnetic Tapes
Your Answer Magnetic Tapes

Multiple Choice Single Answer
Question Security issues become more complex in which environment
Correct Answer Network
Your Answer Network

Multiple Choice Multiple Answer
Question Functions at the server end are
Correct Answer Query , Transaction
Your Answer Query , Transaction , Application Program

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued

Multiple Choice Single Answer
Question What is UML models(E-R models entities)
Correct Answer Objects
Your Answer Objects

Multiple Choice Single Answer
Question Write command "to grant update authority on price column of catalogue to user "Smita"
Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question The functions of Database adminstrator are
Correct Answer Authorization for data access , Schema definition , Maintenance of Database
Your Answer Authorization for data access , Maintenance of Database

Multiple Choice Single Answer
Question What expresses the specific number of entity occurances associated with one occurance of related entity?
Correct Answer Cardinality
Your Answer Cardinality

Multiple Choice Multiple Answer
Question Write examples of dbms
Correct Answer Foxbase , foxpro
Your Answer Foxbase , foxpro

Select The Blank
Question ________is a process by which the user's privileges are ascertained
Correct Answer Authorisation
Your Answer Authorisation

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer Integrity constraints , Database triggers

Multiple Choice Single Answer
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer entity set

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Select The Blank
Question The first commercial RDBMS was ________from Relational Software Inc.
Correct Answer ORACLE
Your Answer ORACLE

Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer functions

True/False
Question You cannot grant or revoke system privileges to users and roles.
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm'
Correct Answer select * from book where bookname like '_m%'
Your Answer select * from book where bookname like '_m%'

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DBMS

Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer records

Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer Relationship set

Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program

Multiple Choice Multiple Answer
Question Which of the following are valid SQL commands.
Correct Answer ALTER , UPDATE
Your Answer ALTER , UPDATE

Multiple Choice Single Answer
Question DDL stands for
Correct Answer Data definition language
Your Answer Data definition language

Multiple Choice Single Answer
Question A person who has control over system is called as
Correct Answer Database administrator
Your Answer Database administrator

Multiple Choice Multiple Answer
Question What are secured using authorisation and access control.
Correct Answer The intranet , local clients , opearators
Your Answer The intranet , local clients , opearators

Multiple Choice Single Answer
Question What is nothing but refined data
Correct Answer Information
Your Answer Information

True/False
Question A database may include varieties of data that are interrelated in many ways.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Select The Blank
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer independent

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued

Match The Following
Question Correct Answer Your Answer

select * from
order by
Views all columns in sorting ording by specified column_name Views all columns in sorting ording by specified column_name

Select * from View all data from table. View all data from table.

select , from

Views 2 specified column from table Views 2 specified column from table

select * from where Views all column satisfying condition in where clause Views all column satisfying condition in where clause

Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char)

Multiple Choice Single Answer
Question To enter new field city in the table 'branch_master' following command is used
Correct Answer alter table branch_master add(city varchar2(25))
Your Answer alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer
Question Malfunctioning of the hardware, or bug in the database software or operating system is called as
Correct Answer System Crash
Your Answer System Crash

Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data

Multiple Choice Multiple Answer
Question Advantages of Database Management System
Correct Answer Reduced redundancy , Sharing of data , Security
Your Answer Reduced redundancy , Sharing of data , Work Space required for execution and storage is less

Multiple Choice Single Answer
Question When two entities are associated then the relationship exists is called :
Correct Answer binary relationship
Your Answer binary relationship

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION

Select The Blank
Question ________published the paper "Relational Model of Data for Large Shared Data Banks "
Correct Answer F.Codd
Your Answer F.Codd

Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer Rectangular box

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Match The Following
Question Correct Answer Your Answer

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool developers

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal

True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question Write command "to grant update authority on price column of catalogue to user "Smita"
Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

Select The Blank
Question ________provides a graphical means of modeling various components of software system
Correct Answer UML
Your Answer UML

Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control

Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation
Correct Answer Functional dependency
Your Answer Functional dependency

True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer False

True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Your Answer True

0 Comments:

An Appeal to SCDL students

Dear SCDL Student,

We at http://scdlpapers.blogspot.com tries to collect and spread the knowledge in terms of the solved papers and assignments which we are getting through SCDL Alumni.
Now we request you to help other students through mutual sharing. Please send your assignment questions/papers to "mindgrill@gmail.com" . We will publish them on this blog along with your name.
Your help can be boon for many students to clear their exams.

Best of Luck and waiting for your contributions.

Team @ MindGrill
 

Interview Preparation | Placement Papers