Multiple Choice Multiple Answer
  Question   In a two tier architecture, the software components are distributed over which two systems
  Correct Answer   Client , Server 
  Your Answer   Client , Server 
 
  True/False
  Question   Temporal constraints can be used to limit the value of a particular attribute to be in a range
  Correct Answer   False
  Your Answer   True
 
  Multiple Choice Multiple Answer
  Question   Write the attributes of entity "book"
  Correct Answer   book_no , Book_name , Price 
  Your Answer   book_no , Book_name , Price 
 
  Multiple Choice Multiple Answer
  Question   Set operators are as follows
  Correct Answer   MINUS , UNION , INTERSECT 
  Your Answer   UNION , INTERSECT , MINUS 
 
  Multiple Choice Multiple Answer
  Question   Three levels of database service
  Correct Answer   External level , Conceptual level , Physical level 
  Your Answer   External level , Conceptual level , Internal level 
 
  Match The Following
Question Correct Answer Your Answer
Data model must know entities,relation,attributes database characteristics
shareability optimal data model's characteristics used in physical modeling
E-R model widely used conceptual model widely used conceptual model
Database design conversion into computer usable form must know entities,relation,attributes
 
  True/False
  Question   Codd developed E-R model
  Correct Answer   False
  Your Answer   False
 
  Select The Blank
  Question   ________means data is protected from deletion and corruption, both while it resides within database
  Correct Answer   Data integrity
  Your Answer   Data integrity
  
 Multiple Choice Single Answer
  Question   Write output of following example SELECT LOWER('JOHN') FROM DUAL;
  Correct Answer   john
  Your Answer   john
 
  Multiple Choice Multiple Answer
  Question   The levels of abstraction of data are
  Correct Answer   Physical level , Logical level , View level 
  Your Answer   Physical level , Logical level 
 
  Multiple Choice Single Answer
  Question   What operation is used to protect data from corruption and deletion .
  Correct Answer   Data integrity
  Your Answer   Data integrity
  
 Select The Blank
  Question   ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
  Correct Answer   Access control
  Your Answer   Access control
  
 Multiple Choice Single Answer
  Question   An example of non-volatile storage is :
  Correct Answer   Magnetic Tapes
  Your Answer   Magnetic Tapes
 
  Multiple Choice Single Answer
  Question   Security issues become more complex in which environment
  Correct Answer   Network
  Your Answer   Network
 
  Multiple Choice Multiple Answer
  Question   Functions at the server end are
  Correct Answer   Query , Transaction 
  Your Answer   Query , Transaction , Application Program 
  
 True/False
  Question   In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
  Correct Answer   False
  Your Answer   False
  
 Multiple Choice Multiple Answer
  Question   Attributes are classified as
  Correct Answer   Simple , Composite , Multivalued 
  Your Answer   Simple , Composite , Multivalued 
 
  Multiple Choice Single Answer
  Question   What is UML models(E-R models entities)
  Correct Answer   Objects
  Your Answer   Objects
 
  Multiple Choice Single Answer
  Question   Write command "to grant update authority on price column of catalogue to user "Smita"
  Correct Answer   GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
  Your Answer   GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
  
 True/False
  Question   In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
  Correct Answer   False
  Your Answer   False
  
 Multiple Choice Multiple Answer
  Question   The functions of Database adminstrator are
  Correct Answer   Authorization for data access , Schema definition , Maintenance of Database 
  Your Answer   Authorization for data access , Maintenance of Database 
  
 Multiple Choice Single Answer
  Question   What expresses the specific number of entity occurances associated with one occurance of related entity?
  Correct Answer   Cardinality
  Your Answer   Cardinality
  
 Multiple Choice Multiple Answer
  Question   Write examples of dbms
  Correct Answer   Foxbase , foxpro 
  Your Answer   Foxbase , foxpro 
 
 Select The Blank
  Question   ________is a process by which the user's privileges are ascertained
  Correct Answer   Authorisation
  Your Answer   Authorisation
 
  Multiple Choice Single Answer
  Question   What operation is used to protect data from corruption and deletion .
  Correct Answer   Data integrity
  Your Answer   Data integrity
  
 Multiple Choice Multiple Answer
  Question   What can be used to manage databases data integrity rule
  Correct Answer   Integrity constraints , Database triggers 
  Your Answer   Integrity constraints , Database triggers 
 
  Multiple Choice Single Answer
  Question   The set of all entities of the same type called as
  Correct Answer   entity set
  Your Answer   entity set
  
 Select The Blank
  Question   Enitity name is written in ________in E-R diagram
  Correct Answer   upper case
  Your Answer   upper case
  
 Select The Blank
  Question   The first commercial RDBMS was ________from Relational Software Inc.
  Correct Answer   ORACLE
  Your Answer   ORACLE
 
  Select The Blank
  Question   UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
  Correct Answer   functions
  Your Answer   functions
 
  True/False
  Question   You cannot grant or revoke system privileges to users and roles.
  Correct Answer   False
  Your Answer   True
  
 Multiple Choice Single Answer
  Question   Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm'
  Correct Answer   select * from book where bookname like '_m%'
  Your Answer   select * from book where bookname like '_m%'
 
  Select The Blank
  Question   In________there is no security of data
  Correct Answer   DBMS
  Your Answer   DBMS
  
 Select The Blank
  Question   File is collection of ________
  Correct Answer   records
  Your Answer   records
 
  Multiple Choice Single Answer
  Question   The set of all relationships of the same type called as
  Correct Answer   Relationship set
  Your Answer   Relationship set
  
 Select The Blank
  Question   ________are collection of instructions for manipulating data
  Correct Answer   program
  Your Answer   program
 
  Multiple Choice Multiple Answer
  Question   Which of the following are valid SQL commands.
  Correct Answer   ALTER , UPDATE 
  Your Answer   ALTER , UPDATE 
 
  Multiple Choice Single Answer
  Question   DDL stands for
  Correct Answer   Data definition language
  Your Answer   Data definition language
 
  Multiple Choice Single Answer
  Question   A person who has control over system is called as
  Correct Answer   Database administrator
  Your Answer   Database administrator
  
 Multiple Choice Multiple Answer
  Question   What are secured using authorisation and access control.
  Correct Answer   The intranet , local clients , opearators 
  Your Answer   The intranet , local clients , opearators 
  
 Multiple Choice Single Answer
  Question   What is nothing but refined data
  Correct Answer   Information
  Your Answer   Information
  
 True/False
  Question   A database may include varieties of data that are interrelated in many ways.
  Correct Answer   True
  Your Answer   True
  
 Multiple Choice Multiple Answer
  Question   Which of the following are functions of DBA
  Correct Answer   Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support 
  Your Answer   Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support 
 
  Select The Blank
  Question   SQL as a language is________of the way it is implemented internally.
  Correct Answer   independent
  Your Answer   independent
 
  Multiple Choice Multiple Answer
  Question   Attributes are classified as
  Correct Answer   Simple , Composite , Multivalued 
  Your Answer   Simple , Composite , Multivalued 
  
 Match The Following
Question Correct Answer Your Answer
select * from 
order by 
Views all columns in sorting ording by specified column_name Views all columns in sorting ording by specified column_name
Select * from  View all data from table. View all data from table.
select , from 
Views 2 specified column from table Views 2 specified column from table
select * from where  Views all column satisfying condition in where clause Views all column satisfying condition in where clause
  Select The Blank
  Question   Each attribute is associted with set of values called as________
  Correct Answer   Domain
  Your Answer   Domain
 
  Multiple Choice Multiple Answer
  Question   Specify any three string functions used in SQL
  Correct Answer   lower(char) , initcap(char) , upper(char) 
  Your Answer   lower(char) , initcap(char) , upper(char) 
 
  Multiple Choice Single Answer
  Question   To enter new field city in the table 'branch_master' following command is used
  Correct Answer   alter table branch_master add(city varchar2(25))
  Your Answer   alter table branch_master add(city varchar2(25))
 
  Multiple Choice Single Answer
  Question   Malfunctioning of the hardware, or bug in the database software or operating system is called as
  Correct Answer   System Crash
  Your Answer   System Crash
 
  Select The Blank
  Question   ________are binary computer representations of stored logical entities
  Correct Answer   Data
  Your Answer   Data
 
  Multiple Choice Multiple Answer
  Question   Advantages of Database Management System
  Correct Answer   Reduced redundancy , Sharing of data , Security 
  Your Answer   Reduced redundancy , Sharing of data , Work Space required for execution and storage is less 
 
  Multiple Choice Single Answer
  Question   When two entities are associated then the relationship exists is called :
  Correct Answer   binary relationship
  Your Answer   binary relationship
 
  True/False
  Question   The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
  Correct Answer   False
  Your Answer   True
 
  Multiple Choice Single Answer
  Question   Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
  Correct Answer   GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
  Your Answer   GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
 
  Select The Blank
  Question   ________published the paper "Relational Model of Data for Large Shared Data Banks "
  Correct Answer   F.Codd
  Your Answer   F.Codd
  
 Select The Blank
  Question   Entities are represented in ________in E-R diagram
  Correct Answer   Rectangular box
  Your Answer   Rectangular box
 
  Select The Blank
  Question   ________means data is protected from deletion and corruption, both while it resides within database
  Correct Answer   Data integrity
  Your Answer   Data integrity
 
  Match The Following
Question Correct Answer Your Answer
Data files Stores the database itself Stores the database itself
Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers
Person who design and implement tools Tool developers Tool developers
Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal
   True/False
  Question   Encryption alone is sufficient to secure the data.
  Correct Answer   False
  Your Answer   False
 
  Multiple Choice Single Answer
  Question   Write command "to grant update authority on price column of catalogue to user "Smita"
  Correct Answer   GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
  Your Answer   GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
 
  Select The Blank
  Question   ________provides a graphical means of modeling various components of software system
  Correct Answer   UML
  Your Answer   UML
  
 Select The Blank
  Question   ________regulates all user access to named objects through privileges
  Correct Answer   Discretionary access control
  Your Answer   Discretionary access control
  
 Multiple Choice Single Answer
  Question   What is many-to-one relationship between two sets of attributes of a given relation
  Correct Answer   Functional dependency
  Your Answer   Functional dependency
 
  True/False
  Question   physical design is tailored to a specific DBMS system
  Correct Answer   True
  Your Answer   False
 
  True/False
  Question   A relational model relates records by the value that they contain.
  Correct Answer   True
  Your Answer   True
 6:35 AM
6:35 AM
 Rozim
Rozim
 Posted in:
 Posted in: