LIST OF ATTEMPTED QUESTIONS AND ANSWERS 	 
 	 
 
 True/False
  Question  	Encryption alone is sufficient to secure the data.
  Correct Answer  	False
  Your Answer  	False
 
 
 Multiple Choice Single Answer
  Question  	Which attribute holds multiple values for single entity?
  Correct Answer  	Multi valued attribute
  Your Answer  	Multi valued attribute
 
 
 Select The Blank
  Question  	________ is one closest to the users.
  Correct Answer  	Logical level
  Your Answer  	Physical level
 
 
 True/False
  Question  	All views are not updatable.
  Correct Answer  	True
  Your Answer  	False
 
 
 Multiple Choice Single Answer
  Question  	(%) stands for :-
  Correct Answer  	Sequence of n characters in character string
  Your Answer  	Sequence of n characters in character string
 
 
 True/False
  Question  	Logical 'OR' operator returns true if both component conditions are true otherwise returns false
  Correct Answer  	False
  Your Answer  	False
 
 
 True/False
  Question  	Structural constraints are specified to force the placement of information into structures.
  Correct Answer  	True
  Your Answer  	True
 
 
 Multiple Choice Single Answer
  Question  	Immediate database modification uses :-
  Correct Answer  	Old Value & New Value
  Your Answer  	Only New Value
 
 
 True/False
  Question  	Distinct clause in select command eliminates rows that have exactly same contents in each column.
  Correct Answer  	True
  Your Answer  	True
 
 
 Select The Blank
  Question  	________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
  Correct Answer  	Program operation independence
  Your Answer  	Program operation independence
 
 
 Multiple Choice Multiple Answer
  Question  	Attributes are classified as :-
  Correct Answer  	Simple , Composite , Multivalued 
  Your Answer  	Simple , Composite , Multivalued , Variant 
 
 
 Multiple Choice Single Answer
  Question  	Security issues become more complex in which environment?
  Correct Answer  	Network
  Your Answer  	Network
 
 
 Multiple Choice Multiple Answer
  Question  	Set operators are as follows :-
  Correct Answer  	UNION , INTERSECT , MINUS 
  Your Answer  	UNION , INTERSECT , MINUS 
 
 
 Multiple Choice Single Answer
  Question  	What will you get when Data items are grouped together?
  Correct Answer  	Entity
  Your Answer  	Data
 
 
 Multiple Choice Multiple Answer
  Question  	The ICAM studies created lot of graphical methods for defining :-
  Correct Answer  	Functions , Data structures 
  Your Answer  	Functions , Combinations , Data structures , Conditions 
 
 
 True/False
  Question  	The information collected during requirement analysis forms input for information modeling.
  Correct Answer  	True
  Your Answer  	True
 
 
 Multiple Choice Multiple Answer
  Question  	Security considerations apply to :-
  Correct Answer  	Data, database , DBMS , Users and applications 
  Your Answer  	Users and applications , Variant , Data, database , DBMS 
 
 
 Multiple Choice Multiple Answer
  Question  	Specify any three string functions used in SQL :-
  Correct Answer  	initcap(char) , upper(char) , lower(char) 
  Your Answer  	lower(char) , initcap(char) , upper(char) , stringlength(char) 
 
 
 Match The Following
Question	Correct Answer	Your Answer
select * from 
order by 
Views all columns in sorting ording by specified column_name	Views all columns in reverse order
Select * from View all data from table. Views all column satisfying condition in where clause
select , from
Views 2 specified column from table Updates records which satisfy condition
select * from where Views all column satisfying condition in where clause Views all columns in sorting ording by specified column_name
 
 
 Multiple Choice Multiple Answer
  Question  	Write the attributes of entity "book" :-
  Correct Answer  	Book_no , Book_name , Price 
  Your Answer  	Book , Book_no , Book_name , Price 
 
 
 Select The Blank
  Question  	Database design model helps in improving________.
  Correct Answer  	Maintainability
  Your Answer  	Maintainability
 
 
 Select The Blank
  Question  	The program which allows multiple users and programs to access the database concurrently is called ________ a database.
  Correct Answer  	Sharing
  Your Answer  	Sharing
 
 
 Multiple Choice Single Answer
  Question  	If a data transfer failure is detected the system involves :-
  Correct Answer  	Recovery procedure
  Your Answer  	Check points
 
 
 Multiple Choice Multiple Answer
  Question  	To be able to successfully design and maintain databases we have to do following :-
  Correct Answer  	Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary 
  Your Answer  	Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary 
 
 
 True/False
  Question  	Wait-die scheme is based on preemptive technique.
  Correct Answer  	False
  Your Answer  	True
 
 
 Multiple Choice Single Answer
  Question  	Backbone of any organization is :-
  Correct Answer  	Information
  Your Answer  	Information
 
 
 Select The Blank
  Question  	A ________ is a database that can maintain information such as video, images, sounds in traditional form.
  Correct Answer  	Universal server
  Your Answer  	Server
 
 
 Select The Blank
  Question  	An alternative technique to log based crash recovery is ________.
  Correct Answer  	Shadow Paging
  Your Answer  	Backup Mechanism
 
 
 Select The Blank
  Question  	File is collection of ________.
  Correct Answer  	Records
  Your Answer  	Records
 
 
 Multiple Choice Multiple Answer
  Question  	Some clauses of Revoke command are as follows :-
  Correct Answer  	FROM , ON 
  Your Answer  	FROM , ON , ANY , MANY 
 
 
 Multiple Choice Single Answer
  Question  	Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
  Correct Answer  	Single valued
  Your Answer  	Single valued
 
 
 Multiple Choice Multiple Answer
  Question  	Different E-R modeling styles are :-
  Correct Answer  	Rein 85 , IDEFIX , Crow's foot 
  Your Answer  	Crow's foot , Rein 85 , IDEFIX , Functions 
 
 
 Multiple Choice Multiple Answer
  Question  	Reasons of creation of views are :-
  Correct Answer  	When data security is required , When data redundancy is to be kept to minimum. 
  Your Answer  	When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required 
 
 
 Select The Blank
  Question  	Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
  Correct Answer  	Character string data types
  Your Answer  	Character string data types
 
 
 Multiple Choice Multiple Answer
  Question  	The front end of database consists of tools such as :-
  Correct Answer  	Forms , Query evaluators , Graphical user interfaces 
  Your Answer  	Forms , Query evaluators , Report writers , Graphical user interfaces 
 
 
 Select The Blank
  Question  	________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
  Correct Answer  	Security
  Your Answer  	Security
 
 
 Multiple Choice Multiple Answer
  Question  	What are secured using authorization and access control?
  Correct Answer  	The intranet , Local clients , Operators 
  Your Answer  	The intranet , Local clients , Operators , The internet 
 
 
 Multiple Choice Single Answer
  Question  	When two entities are associated then the relationship which exists is called :-
  Correct Answer  	Binary relationship
  Your Answer  	Quarterly relationship
 
 
 Multiple Choice Single Answer
  Question  	Shadow paging technique maintains two pages during the life time of a transaction namely :-
  Correct Answer  	Current page & Shadow page
  Your Answer  	Current page & Shadow page
 
 
 Multiple Choice Single Answer
  Question  	Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
  Correct Answer  	CURE
  Your Answer  	SERE
 
 
 True/False
  Question  	A fully developed data model includes domains for each attribute in the E-R model.
  Correct Answer  	True
  Your Answer  	True
 
 
 Multiple Choice Single Answer
  Question  	Which of the following term means that the data model is not specific to any particular application?
  Correct Answer  	Sharebillity
  Your Answer  	Structured validity
 
 
 Match The Following
Question	Correct Answer	Your Answer
DBA Data base administrator Data base administrator
UML Unified modeling language Unified modeling language
DBMS Data base management system Data base management system
RDBMS Relational DBMS Relational DBMS
 
 
 True/False
  Question  	If attribute is multi-valued then single lines are used.
  Correct Answer  	False
  Your Answer  	True
 
 
 Select The Blank
  Question  	In________there is no security of data.
  Correct Answer  	DBMS
  Your Answer  	RDBMS
 
 
 Select The Blank
  Question  	________ is a process by which user's identity is checked.
  Correct Answer  	Authentication
  Your Answer  	Authentication
 
 
 True/False
  Question  	If attribute is derived dotted line is used.
  Correct Answer  	True
  Your Answer  	True
 3:41 AM
3:41 AM
 Rozim
Rozim
 Posted in:
 Posted in: