LIST OF ATTEMPTED QUESTIONS AND ANSWERS
 
 Multiple Choice Multiple Answer
  Question  
Security considerations apply to
  Correct Answer  
users and applications , data, database , dbms 
  Your Answer  
data, database , dbms , users and applications 
 
 Select The Blank
  Question  
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
  Correct Answer  
Access control
  Your Answer  
Access control
 
 Multiple Choice Multiple Answer
  Question  
Advantages of Database Management System
  Correct Answer  
Reduced redundancy , Sharing of data , Security 
  Your Answer  
Reduced redundancy , Sharing of data , Security , Work Space required for
execution and storage is less 
 
 Multiple Choice Multiple Answer
  Question  
Which of the following is a database privilege
  Correct Answer  
The right to connect the database , The right to create table , The right to
select rows from another user's table 
  Your Answer  
The right to connect the database , The right to create table , System
programming 
 
 True/False
  Question  
You cannot grant or revoke system privileges to users and roles.
  Correct Answer  
False
  Your Answer  
False
 
 True/False
  Question  
Centralised Database Management cannot support multiple users.
  Correct Answer  
False
  Your Answer  
False
 
 Match The Following
Question
Correct Answer
Your Answer
Menu driven interface
Stand alone user
Query language interface
Casual user
DBA
Programming language interface
Application user
Application user
Forms and command code
Parametric user
Storage Manager
 
 Multiple Choice Multiple Answer
  Question  
Different syntaxes used for update command in SQL are as follows.
  Correct Answer  
update 
set = , update 
set = where 
  Your Answer  
update 
set = where 
 
 Multiple Choice Multiple Answer
  Question  
Some examples of select command are as following using emp_table
  Correct Answer  
select * from emp; , select empno,name from emp , select empno,name from emp
where salary in(9000,10000); 
  Your Answer  
select * from emp; , select empno,name from emp where salary in(9000,10000);
 
 Multiple Choice Multiple Answer
  Question  
Strong entities are also called as
  Correct Answer  
dominant , Parent , owner 
  Your Answer  
dominant , owner 
 
 Multiple Choice Multiple Answer
  Question  
Specify any three string functions used in SQL
  Correct Answer  
lower(char) , initcap(char) , upper(char) 
  Your Answer  
lower(char) , upper(char) , stringlength(char) 
 
 Multiple Choice Single Answer
  Question  
What will you get when Data items are grouped together.
  Correct Answer  
Entity
  Your Answer  
Entity
 
 Select The Blank
  Question  
A________ mechanism that can be used to provide authorization
  Correct Answer  
role
  Your Answer  
role
 
 Multiple Choice Multiple Answer
  Question  
Which of the following is a database privilege
  Correct Answer  
The right to connect the database , The right to create table , The right to
select rows from another user's table 
  Your Answer  
The right to connect the database , The right to create table , The right to
select rows from another user's table , System programming 
 
 Multiple Choice Single Answer
  Question  
In order to implement checkpoint the log is checked :
  Correct Answer  
Backwards
  Your Answer  
Backwards
 
 Multiple Choice Single Answer
  Question  
( _ ) stands for
  Correct Answer  
any single character in character string
  Your Answer  
any single character in character string
 
 True/False
  Question  
A role provides authorisation.
  Correct Answer  
True
  Your Answer  
True
 
 Select The Blank
  Question  
Entities are represented in ________in E-R diagram
  Correct Answer  
Rectangular box
  Your Answer  
square box
 
 True/False
  Question  
The SSL protocol developed by microsoft corporation, is an industry accepted
standard for network transport layer security
  Correct Answer  
False
  Your Answer  
True
 
 Multiple Choice Single Answer
  Question  
One method of protecting the privacy and integrity of a system is to place a
firewall between internet and
  Correct Answer  
Public network
  Your Answer  
intranet
 
 True/False
  Question  
SQL is low level language
  Correct Answer  
False
  Your Answer  
True
 
 True/False
  Question  
To update city_name to bombay following command is used. UPDATE EMP_TABLE
SET CITY='BOMBAY';
  Correct Answer  
True
  Your Answer  
True
 
 Select The Blank
  Question  
________are binary computer representations of stored logical entities
  Correct Answer  
Data
  Your Answer  
Program
 
 Multiple Choice Single Answer
  Question  
Degree of relationship indicates no of associated -
  Correct Answer  
Entities
  Your Answer  
Entities
 
 Multiple Choice Single Answer
  Question  
To enter new field city in the table 'branch_master' following command is
used
  Correct Answer  
alter table branch_master add(city varchar2(25))
  Your Answer  
alter table branch_master add(city varchar2(25))
 
 Multiple Choice Single Answer
  Question  
The set of all relationships of the same type called as
  Correct Answer  
Relationship set
  Your Answer  
Relationship set
 
 True/False
  Question  
In Database management system, protection includes against hardware and
Software malfunctions and not against unauthorized access.
  Correct Answer  
False
  Your Answer  
False
 
 Select The Blank
  Question  
UML additionaly provide set of ________that can be invoked to compute values
on the basis of attributes of the object
  Correct Answer  
functions
  Your Answer  
functions
 
 True/False
  Question  
A role provides authorisation.
  Correct Answer  
True
  Your Answer  
True
 
 Multiple Choice Single Answer
  Question  
Data can be inserted by row in a table following command can be used.
  Correct Answer  
INSERT
  Your Answer  
INSERT
 
 Select The Blank
  Question  
________is a process by which the user's privileges are ascertained
  Correct Answer  
Authorisation
  Your Answer  
Authentication
 
 True/False
  Question  
Logical 'OR' operator returns true if both component conditions are true
otherwise returns false
  Correct Answer  
False
  Your Answer  
False
 
 Select The Blank
  Question  
The information collected in requirement analysis stage is ________for
information modeling
  Correct Answer  
input
  Your Answer  
input
 
 Multiple Choice Multiple Answer
  Question  
Attributes are classified as
  Correct Answer  
Simple , Composite , Multivalued 
  Your Answer  
Simple , Composite , Multivalued 
 
 Multiple Choice Single Answer
  Question  
In three tier architecture, the layer which provides user interface and
interacts with the user is :
  Correct Answer  
Presentation layer
  Your Answer  
Presentation layer
 
 Match The Following
Question
Correct Answer
Your Answer
Authorisation
permission given to user
Provide authority
Previlege
Permission for accessing objects
Permission for accessing objects
Role
Provide authority
permission given to user
Integrity
hallmark of data security
hallmark of data security
 
 Multiple Choice Single Answer
  Question  
Overheads can be reduced by is introducing :
  Correct Answer  
checkpoints
  Your Answer  
checkpoints
 
 Multiple Choice Multiple Answer
  Question  
What are secured using authorisation and access control.
  Correct Answer  
The intranet , local clients , opearators 
  Your Answer  
The intranet , the internet 
 
 Multiple Choice Single Answer
  Question  
Which type of attribute holds single value for single entity?
  Correct Answer  
single valued attribute
  Your Answer  
simple attribute
 
 Select The Blank
  Question  
________regulates all user access to named objects through privileges
  Correct Answer  
Discretionary access control
  Your Answer  
System access control
 
 Multiple Choice Multiple Answer
  Question  
Which of the following are object oriented features
  Correct Answer  
Inheritance , Abstraction 
  Your Answer  
Inheritance , Polymerisation 
 
 Multiple Choice Multiple Answer
  Question  
Three levels of database service
  Correct Answer  
External level , Conceptual level , Physical level 
  Your Answer  
External level , Conceptual level , Physical level 
 
 Select The Blank
  Question  
The most widely used conceptual model is________
  Correct Answer  
E-R model
  Your Answer  
E-R model
 
 Select The Blank
  Question  
A________ mechanism that can be used to provide authorization
  Correct Answer  
role
  Your Answer  
role
 
 Select The Blank
  Question  
A________is a situation,event or Personnel that will adversely affect the
database security and the smooth functioning of organization
  Correct Answer  
Threat
  Your Answer  
Threat
 
 True/False
  Question  
Using database redumdancy can be removed
  Correct Answer  
True
  Your Answer  
True
 
 Multiple Choice Single Answer
  Question  
What is alternative name for functions
  Correct Answer  
methods
  Your Answer  
programs
 4:45 AM
4:45 AM
 Rozim
Rozim
 Posted in:
 Posted in: