DATABASE MANAGEMENT SYSTEMS
    
 Multiple Choice Multiple Answer
  Question   Following date formats used in oracle
  Correct Answer   TO_CHAR() , TO_DATE() 
  Your Answer   TO_DATE() 
 
  Select The Blank
  Question   ________means data is protected from deletion and corruption, both while it resides within database
  Correct Answer   Data integrity
  Your Answer   Data integrity
 
  Multiple Choice Multiple Answer
  Question   To be able to successfully design and maintain databases we have to do following
  Correct Answer   Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary 
  Your Answer   Identify relationship between objects , Data dictionary 
 
  True/False
  Question   The data in the database cannot be shared
  Correct Answer   False
  Your Answer   False
  
 Multiple Choice Single Answer
  Question   What is many-to-one relationship between two sets of attributes of a given relation
  Correct Answer   Functional dependency
  Your Answer   Functional dependency
  
 Multiple Choice Single Answer
  Question   When an attribute composed of multiple components, each with an independent existence is called as
  Correct Answer   composite attribute
  Your Answer   composite attribute
  
 Multiple Choice Single Answer
  Question   Which of the following term means the ability to represent a model using esily understood diagrammatic notation
  Correct Answer   Diagrammatic representation
  Your Answer   Diagrammatic representation
 
  True/False
  Question   physical design is tailored to a specific DBMS system
  Correct Answer   True
  Your Answer   True
  
 Match The Following
Question Correct Answer Your Answer
Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal
Data files Stores the database itself Stores the database itself
Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers
Person who design and implement tools Tool developers Tool box developers
 
  Multiple Choice Multiple Answer
  Question   Which of the following are functions of DBA
  Correct Answer   Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support 
  Your Answer   Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support 
  
 Multiple Choice Single Answer
  Question   Which of the following term means the ability to represent a model using esily understood diagrammatic notation
  Correct Answer   Diagrammatic representation
  Your Answer   Diagrammatic representation
  
 Multiple Choice Multiple Answer
  Question   Specify any three string functions used in SQL
  Correct Answer   lower(char) , initcap(char) , upper(char) 
  Your Answer   lower(char) , initcap(char) , upper(char) 
  
 Multiple Choice Single Answer
  Question   One method of protecting the privacy and integrity of a system is to place a firewall between internet and
  Correct Answer   Public network
  Your Answer   intranet
  
 True/False
  Question   Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
  Correct Answer   True
  Your Answer   True
  
 Select The Blank
  Question   The most widely used conceptual model is________
  Correct Answer   E-R model
  Your Answer   E-R model
 
  True/False
  Question   The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
  Correct Answer   False
  Your Answer   False
  
 True/False
  Question   The shadow page table is never changed over the duration of the transaction
  Correct Answer   True
  Your Answer   True
 
  True/False
  Question   The Database administrator cannot grant or revoke privileges to users.
  Correct Answer   False
  Your Answer   False
  
 Multiple Choice Single Answer
  Question   Write a command to grant all privileges on BOOK TABLE to user "Mathews"
  Correct Answer   GRANT ALL ON BOOK TO MATHEWS
  Your Answer   GRANT ALL ON BOOK TO MATHEWS
 
  Multiple Choice Single Answer
  Question   Write output of following example SELECT LOWER('JOHN') FROM DUAL;
  Correct Answer   john
  Your Answer   john
  
 Select The Blank
  Question   ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
  Correct Answer   Access control
  Your Answer   Access control
 
  Multiple Choice Single Answer
  Question   Write SQL statement, which shows contents of table book, whose price is less than 4000 and more than 1000
  Correct Answer   select * from book where price>1000 and price<4000
  Your Answer   select * from book where price>1000 and price<4000
 
  Multiple Choice Multiple Answer
  Question   There are two kinds of tables -
  Correct Answer   base tables , views 
  Your Answer   base tables , system 
 
  Match The Following
Question Correct Answer Your Answer
Integrity hallmark of data security hallmark of data security
Authorisation permission given to user Provide authority
Previlege Permission for accessing objects permission given to user
Role Provide authority Permission for accessing objects
  True/False
  Question   To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
  Correct Answer   True
  Your Answer   True
 
  Multiple Choice Multiple Answer
  Question   Specify any 2 forms of insert command
  Correct Answer   INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE 
  Your Answer   INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE 
 
  Multiple Choice Multiple Answer
  Question   Following are properties of roles allowed for easier privilege management
  Correct Answer   Reduced privilege administration , Dynamic privilege administration , application awareness 
  Your Answer   Dynamic privilege administration , Deletion of information 
  
 Multiple Choice Multiple Answer
  Question   Strong entities are also called as
  Correct Answer   dominant , Parent , owner 
  Your Answer   Parent 
 
  True/False
  Question   A user can grant any object privilege on any object he or she owns to any other user or role
  Correct Answer   True
  Your Answer   True
 
  Multiple Choice Multiple Answer
  Question   Security considerations apply to
  Correct Answer   data, database , dbms , users and applications 
  Your Answer   data, database , dbms , users and applications 
  
 Select The Blank
  Question   ________regulates all user access to named objects through privileges
  Correct Answer   Discretionary access control
  Your Answer   Discretionary access control
 
  True/False
  Question   Distinct clause in select command eliminates rows that have exactly same contents in each column.
  Correct Answer   True
  Your Answer   True
 
  Multiple Choice Single Answer
  Question   Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
  Correct Answer   CURE
  Your Answer   RE
 
  True/False
  Question   A relational model relates records by the value that they contain.
  Correct Answer   True
  Your Answer   False
  
 Select The Blank
  Question   In________there is no security of data
  Correct Answer   DBMS
  Your Answer   DBMS
 
  Multiple Choice Multiple Answer
  Question   A Database Management System has several subsystems
  Correct Answer   Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem 
  Your Answer   Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem 
  
 Select The Blank
  Question   UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
  Correct Answer   functions
  Your Answer   functions
  
 Select The Blank
  Question   In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language
  Correct Answer   ANSI American national std institute
  Your Answer   ANSI American national std institute
  
 Multiple Choice Multiple Answer
  Question   The different types of database users
  Correct Answer   Security officers , Database administrators , Network administrators 
  Your Answer   Database administrators , Database operators 
  
 Select The Blank
  Question   Each attribute is associted with set of values called as________
  Correct Answer   Domain
  Your Answer   Relation
 
  Multiple Choice Single Answer
  Question   Access to a database can be controlled using
  Correct Answer   Access Privilages
  Your Answer   Access control
 
  Select The Blank
  Question   Structctural validity in data modeling means ________
  Correct Answer   consistency
  Your Answer   consistency
  
 Select The Blank
  Question   ________ is tailored to specific DBMS system
  Correct Answer   Physical design
  Your Answer   Physical design
 
  Multiple Choice Single Answer
  Question   In an Entity relationship diagram total participation of an entity in a relationship set is indicated by :
  Correct Answer   Double line
  Your Answer   Double ellipse
  
 Multiple Choice Multiple Answer
  Question   The ICAM studies created lot of graphical methods for defining
  Correct Answer   Functions , Data structures 
  Your Answer   Data structures 
  
 Select The Blank
  Question   Enitity name is written in ________in E-R diagram
  Correct Answer   upper case
  Your Answer   upper case
  
 Multiple Choice Single Answer
  Question   Write the use of UPDATE command
  Correct Answer   To change or to modify data values in table
  Your Answer   To change or to modify data values in table
  
  Select The Blank
  Question   ________published the paper "Relational Model of Data for Large Shared Data Banks "
  Correct Answer   F.Codd
  Your Answer   F.Codd
 
  Select The Blank
  Question   Database design model helps in improving________
  Correct Answer   maintainability
  Your Answer   maintainability
 
  Multiple Choice Multiple Answer
  Question   SSL protocol provides
  Correct Answer   authorisation , data encryption , data integrity 
  Your Answer   authorisation , data encryption , security 
  
 True/False
  Question   To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
  Correct Answer   True
  Your Answer   False
  
 Multiple Choice Single Answer
  Question   Class room entity has single value for room_no attribute so room_no attriute is reffered to as
  Correct Answer   Single valued
  Your Answer   Single valued
 
  Multiple Choice Single Answer
  Question   Which type of attribute represents a value that is derivable from the value of related attribute
  Correct Answer   derived attribute
  Your Answer   derived attribute
  
 Multiple Choice Multiple Answer
  Question   Some clauses of Revoke command are as follows
  Correct Answer   FROM , ON 
  Your Answer   FROM , ON , ANY 
 
  Select The Blank
  Question   A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
  Correct Answer   Threat
  Your Answer   Threat
 
  Multiple Choice Single Answer
  Question   In an Entity relationship diagram, what is used to link attributes to entity sets and entity sets to relationships?
  Correct Answer   Line
  Your Answer   Line
 
  Select The Blank
  Question   ________are binary computer representations of stored logical entities
  Correct Answer   Data
  Your Answer   Data
 
  Select The Blank
  Question   Enitity name is written in ________in E-R diagram
  Correct Answer   upper case
  Your Answer   upper case
 
  Multiple Choice Single Answer
  Question   (%) stands for
  Correct Answer   Sequence of n characters in character string
  Your Answer   Sequence of n characters in character string
  
 Select The Blank
  Question   ________are collection of instructions for manipulating data
  Correct Answer   program
  Your Answer   program
  
 Select The Blank
  Question   ________means data is protected from deletion and corruption, both while it resides within database
  Correct Answer   Data integrity
  Your Answer   Data integrity
 
  Match The Following
Question Correct Answer Your Answer
Menu driven interface Stand alone user Stand alone user
Query language interface Casual user Casual user
Programming language interface Application user DBA
Forms and command code Parametric user Parametric user
  Select The Blank
  Question   In________there is no security of data
  Correct Answer   DBMS
  Your Answer   DML
 
  Multiple Choice Multiple Answer
  Question   Which of the following are valid SQL commands.
  Correct Answer   ALTER , UPDATE 
  Your Answer   ALTER , UPDATE 
 
  Select The Blank
  Question   ________is a process by which user's identity is checked
  Correct Answer   Authentication
  Your Answer   Authentication
  
 Select The Blank
  Question   Entities are represented in ________in E-R diagram
  Correct Answer   Rectangular box
  Your Answer   square box
  
 Select The Blank
  Question   File is collection of ________
  Correct Answer   records
  Your Answer   Data
 
  Multiple Choice Single Answer
  Question   WWW stands for
  Correct Answer   World wide web
  Your Answer   World wide web
 
  Select The Blank
  Question   The most widely used conceptual model is________
  Correct Answer   E-R model
  Your Answer   E-R model
  
 Select The Blank
  Question   ________provides a graphical means of modeling various components of software system
  Correct Answer   UML
  Your Answer   ERD
 
  True/False
  Question   SQL is low level language
  Correct Answer   False
  Your Answer   False
 
  Multiple Choice Single Answer
  Question   What operation is used to protect data from corruption and deletion .
  Correct Answer   Data integrity
  Your Answer   Data integrity
  
 True/False
  Question   Centralised Database Management cannot support multiple users.
  Correct Answer   False
  Your Answer   False
  
 Multiple Choice Multiple Answer
  Question   What can be used to manage databases data integrity rule
  Correct Answer   Integrity constraints , Database triggers 
  Your Answer   security , Integrity constraints , Database triggers 
 
  True/False
  Question   Unary operator operates only on one operand.
  Correct Answer   True
  Your Answer   True
 6:32 AM
6:32 AM
 Rozim
Rozim
 Posted in:
 Posted in: