Wecome to all SCDLians

Hello Guys, i am requesting to all audience of this blog to like any thing that should be available for other students so please co-operate me and if you have any test papers as latest as that could be published with your reference. Please send with your name at the e-mail skdwivedi2009@gmail.com

Thank You !!
Showing posts with label Database Management System. Show all posts
Showing posts with label Database Management System. Show all posts

Friday, July 23, 2010

Database Management System








Multiple Choice Multiple Answer
Question Following date formats used in oracle
Correct Answer TO_CHAR() , TO_DATE()
Your Answer TO_DATE()

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Identify relationship between objects , Data dictionary

True/False
Question The data in the database cannot be shared
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation
Correct Answer Functional dependency
Your Answer Functional dependency

Multiple Choice Single Answer
Question When an attribute composed of multiple components, each with an independent existence is called as
Correct Answer composite attribute
Your Answer composite attribute

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer True

Match The Following
Question Correct Answer Your Answer

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool box developers


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char)

Multiple Choice Single Answer
Question One method of protecting the privacy and integrity of a system is to place a firewall between internet and
Correct Answer Public network
Your Answer intranet

True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True

Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer False

True/False
Question The shadow page table is never changed over the duration of the transaction
Correct Answer True
Your Answer True

True/False
Question The Database administrator cannot grant or revoke privileges to users.
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question Write a command to grant all privileges on BOOK TABLE to user "Mathews"
Correct Answer GRANT ALL ON BOOK TO MATHEWS
Your Answer GRANT ALL ON BOOK TO MATHEWS

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question Write SQL statement, which shows contents of table book, whose price is less than 4000 and more than 1000
Correct Answer select * from book where price>1000 and price<4000 Your Answer select * from book where price>1000 and price<4000 Multiple Choice Multiple Answer Question There are two kinds of tables - Correct Answer base tables , views Your Answer base tables , system Match The Following Question Correct Answer Your Answer Integrity hallmark of data security hallmark of data security Authorisation permission given to user Provide authority Previlege Permission for accessing objects permission given to user Role Provide authority Permission for accessing objects True/False Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY'; Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Specify any 2 forms of insert command Correct Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE Your Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE Multiple Choice Multiple Answer Question Following are properties of roles allowed for easier privilege management Correct Answer Reduced privilege administration , Dynamic privilege administration , application awareness Your Answer Dynamic privilege administration , Deletion of information Multiple Choice Multiple Answer Question Strong entities are also called as Correct Answer dominant , Parent , owner Your Answer Parent True/False Question A user can grant any object privilege on any object he or she owns to any other user or role Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Security considerations apply to Correct Answer data, database , dbms , users and applications Your Answer data, database , dbms , users and applications Select The Blank Question ________regulates all user access to named objects through privileges Correct Answer Discretionary access control Your Answer Discretionary access control True/False Question Distinct clause in select command eliminates rows that have exactly same contents in each column. Correct Answer True Your Answer True Multiple Choice Single Answer Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL Correct Answer CURE Your Answer RE True/False Question A relational model relates records by the value that they contain. Correct Answer True Your Answer False Select The Blank Question In________there is no security of data Correct Answer DBMS Your Answer DBMS Multiple Choice Multiple Answer Question A Database Management System has several subsystems Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem Select The Blank Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object Correct Answer functions Your Answer functions Select The Blank Question In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language Correct Answer ANSI American national std institute Your Answer ANSI American national std institute Multiple Choice Multiple Answer Question The different types of database users Correct Answer Security officers , Database administrators , Network administrators Your Answer Database administrators , Database operators Select The Blank Question Each attribute is associted with set of values called as________ Correct Answer Domain Your Answer Relation Multiple Choice Single Answer Question Access to a database can be controlled using Correct Answer Access Privilages Your Answer Access control Select The Blank Question Structctural validity in data modeling means ________ Correct Answer consistency Your Answer consistency Select The Blank Question ________ is tailored to specific DBMS system Correct Answer Physical design Your Answer Physical design Multiple Choice Single Answer Question In an Entity relationship diagram total participation of an entity in a relationship set is indicated by : Correct Answer Double line Your Answer Double ellipse Multiple Choice Multiple Answer Question The ICAM studies created lot of graphical methods for defining Correct Answer Functions , Data structures Your Answer Data structures Select The Blank Question Enitity name is written in ________in E-R diagram Correct Answer upper case Your Answer upper case Multiple Choice Single Answer Question Write the use of UPDATE command Correct Answer To change or to modify data values in table Your Answer To change or to modify data values in table Select The Blank Question ________published the paper "Relational Model of Data for Large Shared Data Banks " Correct Answer F.Codd Your Answer F.Codd Select The Blank Question Database design model helps in improving________ Correct Answer maintainability Your Answer maintainability Multiple Choice Multiple Answer Question SSL protocol provides Correct Answer authorisation , data encryption , data integrity Your Answer authorisation , data encryption , security True/False Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY'; Correct Answer True Your Answer False Multiple Choice Single Answer Question Class room entity has single value for room_no attribute so room_no attriute is reffered to as Correct Answer Single valued Your Answer Single valued Multiple Choice Single Answer Question Which type of attribute represents a value that is derivable from the value of related attribute Correct Answer derived attribute Your Answer derived attribute Multiple Choice Multiple Answer Question Some clauses of Revoke command are as follows Correct Answer FROM , ON Your Answer FROM , ON , ANY Select The Blank Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization Correct Answer Threat Your Answer Threat Multiple Choice Single Answer Question In an Entity relationship diagram, what is used to link attributes to entity sets and entity sets to relationships? Correct Answer Line Your Answer Line Select The Blank Question ________are binary computer representations of stored logical entities Correct Answer Data Your Answer Data Select The Blank Question Enitity name is written in ________in E-R diagram Correct Answer upper case Your Answer upper case Multiple Choice Single Answer Question (%) stands for Correct Answer Sequence of n characters in character string Your Answer Sequence of n characters in character string Select The Blank Question ________are collection of instructions for manipulating data Correct Answer program Your Answer program Select The Blank Question ________means data is protected from deletion and corruption, both while it resides within database Correct Answer Data integrity Your Answer Data integrity Match The Following Question Correct Answer Your Answer Menu driven interface Stand alone user Stand alone user Query language interface Casual user Casual user Programming language interface Application user DBA Forms and command code Parametric user Parametric user Select The Blank Question In________there is no security of data Correct Answer DBMS Your Answer DML Multiple Choice Multiple Answer Question Which of the following are valid SQL commands. Correct Answer ALTER , UPDATE Your Answer ALTER , UPDATE Select The Blank Question ________is a process by which user's identity is checked Correct Answer Authentication Your Answer Authentication Select The Blank Question Entities are represented in ________in E-R diagram Correct Answer Rectangular box Your Answer square box Select The Blank Question File is collection of ________ Correct Answer records Your Answer Data Multiple Choice Single Answer Question WWW stands for Correct Answer World wide web Your Answer World wide web Select The Blank Question The most widely used conceptual model is________ Correct Answer E-R model Your Answer E-R model Select The Blank Question ________provides a graphical means of modeling various components of software system Correct Answer UML Your Answer ERD True/False Question SQL is low level language Correct Answer False Your Answer False Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer Data integrity True/False Question Centralised Database Management cannot support multiple users. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Integrity constraints , Database triggers Your Answer security , Integrity constraints , Database triggers True/False Question Unary operator operates only on one operand. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question In a two tier architecture, the software components are distributed over which two systems Correct Answer Client , Server Your Answer Client , Server True/False Question Temporal constraints can be used to limit the value of a particular attribute to be in a range Correct Answer False Your Answer True Multiple Choice Multiple Answer Question Write the attributes of entity "book" Correct Answer book_no , Book_name , Price Your Answer book_no , Book_name , Price Multiple Choice Multiple Answer Question Set operators are as follows Correct Answer MINUS , UNION , INTERSECT Your Answer UNION , INTERSECT , MINUS Multiple Choice Multiple Answer Question Three levels of database service Correct Answer External level , Conceptual level , Physical level Your Answer External level , Conceptual level , Internal level Match The Following Question Correct Answer Your Answer Data model must know entities,relation,attributes database characteristics shareability optimal data model's characteristics used in physical modeling E-R model widely used conceptual model widely used conceptual model Database design conversion into computer usable form must know entities,relation,attributes True/False Question Codd developed E-R model Correct Answer False Your Answer False Select The Blank Question ________means data is protected from deletion and corruption, both while it resides within database Correct Answer Data integrity Your Answer Data integrity Multiple Choice Single Answer Question Write output of following example SELECT LOWER('JOHN') FROM DUAL; Correct Answer john Your Answer john Multiple Choice Multiple Answer Question The levels of abstraction of data are Correct Answer Physical level , Logical level , View level Your Answer Physical level , Logical level Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer Data integrity Select The Blank Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges. Correct Answer Access control Your Answer Access control Multiple Choice Single Answer Question An example of non-volatile storage is : Correct Answer Magnetic Tapes Your Answer Magnetic Tapes Multiple Choice Single Answer Question Security issues become more complex in which environment Correct Answer Network Your Answer Network Multiple Choice Multiple Answer Question Functions at the server end are Correct Answer Query , Transaction Your Answer Query , Transaction , Application Program True/False Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question Attributes are classified as Correct Answer Simple , Composite , Multivalued Your Answer Simple , Composite , Multivalued Multiple Choice Single Answer Question What is UML models(E-R models entities) Correct Answer Objects Your Answer Objects Multiple Choice Single Answer Question Write command "to grant update authority on price column of catalogue to user "Smita" Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA True/False Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question The functions of Database adminstrator are Correct Answer Authorization for data access , Schema definition , Maintenance of Database Your Answer Authorization for data access , Maintenance of Database Multiple Choice Single Answer Question What expresses the specific number of entity occurances associated with one occurance of related entity? Correct Answer Cardinality Your Answer Cardinality Multiple Choice Multiple Answer Question Write examples of dbms Correct Answer Foxbase , foxpro Your Answer Foxbase , foxpro Select The Blank Question ________is a process by which the user's privileges are ascertained Correct Answer Authorisation Your Answer Authorisation Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer Data integrity Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Integrity constraints , Database triggers Your Answer Integrity constraints , Database triggers Multiple Choice Single Answer Question The set of all entities of the same type called as Correct Answer entity set Your Answer entity set Select The Blank Question Enitity name is written in ________in E-R diagram Correct Answer upper case Your Answer upper case Select The Blank Question The first commercial RDBMS was ________from Relational Software Inc. Correct Answer ORACLE Your Answer ORACLE Select The Blank Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object Correct Answer functions Your Answer functions True/False Question You cannot grant or revoke system privileges to users and roles. Correct Answer False Your Answer True Multiple Choice Single Answer Question Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm' Correct Answer select * from book where bookname like '_m%' Your Answer select * from book where bookname like '_m%' Select The Blank Question In________there is no security of data Correct Answer DBMS Your Answer DBMS Select The Blank Question File is collection of ________ Correct Answer records Your Answer records Multiple Choice Single Answer Question The set of all relationships of the same type called as Correct Answer Relationship set Your Answer Relationship set Select The Blank Question ________are collection of instructions for manipulating data Correct Answer program Your Answer program Multiple Choice Multiple Answer Question Which of the following are valid SQL commands. Correct Answer ALTER , UPDATE Your Answer ALTER , UPDATE Multiple Choice Single Answer Question DDL stands for Correct Answer Data definition language Your Answer Data definition language Multiple Choice Single Answer Question A person who has control over system is called as Correct Answer Database administrator Your Answer Database administrator Multiple Choice Multiple Answer Question What are secured using authorisation and access control. Correct Answer The intranet , local clients , opearators Your Answer The intranet , local clients , opearators Multiple Choice Single Answer Question What is nothing but refined data Correct Answer Information Your Answer Information True/False Question A database may include varieties of data that are interrelated in many ways. Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Which of the following are functions of DBA Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support Select The Blank Question SQL as a language is________of the way it is implemented internally. Correct Answer independent Your Answer independent Multiple Choice Multiple Answer Question Attributes are classified as Correct Answer Simple , Composite , Multivalued Your Answer Simple , Composite , Multivalued Match The Following Question Correct Answer Your Answer select * from order by Views all columns in sorting ording by specified column_name Views all columns in sorting ording by specified column_name Select * from View all data from table. View all data from table. select , from Views 2 specified column from table Views 2 specified column from table select * from where Views all column satisfying condition in where clause Views all column satisfying condition in where clause Select The Blank Question Each attribute is associted with set of values called as________ Correct Answer Domain Your Answer Domain Multiple Choice Multiple Answer Question Specify any three string functions used in SQL Correct Answer lower(char) , initcap(char) , upper(char) Your Answer lower(char) , initcap(char) , upper(char) Multiple Choice Single Answer Question To enter new field city in the table 'branch_master' following command is used Correct Answer alter table branch_master add(city varchar2(25)) Your Answer alter table branch_master add(city varchar2(25)) Multiple Choice Single Answer Question Malfunctioning of the hardware, or bug in the database software or operating system is called as Correct Answer System Crash Your Answer System Crash Select The Blank Question ________are binary computer representations of stored logical entities Correct Answer Data Your Answer Data Multiple Choice Multiple Answer Question Advantages of Database Management System Correct Answer Reduced redundancy , Sharing of data , Security Your Answer Reduced redundancy , Sharing of data , Work Space required for execution and storage is less Multiple Choice Single Answer Question When two entities are associated then the relationship exists is called : Correct Answer binary relationship Your Answer binary relationship True/False Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security Correct Answer False Your Answer True Multiple Choice Single Answer Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION Select The Blank Question ________published the paper "Relational Model of Data for Large Shared Data Banks " Correct Answer F.Codd Your Answer F.Codd Select The Blank Question Entities are represented in ________in E-R diagram Correct Answer Rectangular box Your Answer Rectangular box Select The Blank Question ________means data is protected from deletion and corruption, both while it resides within database Correct Answer Data integrity Your Answer Data integrity Match The Following Question Correct Answer Your Answer Data files Stores the database itself Stores the database itself Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers Person who design and implement tools Tool developers Tool developers Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal True/False Question Encryption alone is sufficient to secure the data. Correct Answer False Your Answer False Multiple Choice Single Answer Question Write command "to grant update authority on price column of catalogue to user "Smita" Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA Select The Blank Question ________provides a graphical means of modeling various components of software system Correct Answer UML Your Answer UML Select The Blank Question ________regulates all user access to named objects through privileges Correct Answer Discretionary access control Your Answer Discretionary access control Multiple Choice Single Answer Question What is many-to-one relationship between two sets of attributes of a given relation Correct Answer Functional dependency Your Answer Functional dependency True/False Question physical design is tailored to a specific DBMS system Correct Answer True Your Answer False True/False Question A relational model relates records by the value that they contain. Correct Answer True Your Answer True


LIST OF ATTEMPTED QUESTIONS AND ANSWERS

True/False
Question
Encryption alone is sufficient to secure the data.
Correct Answer
False
Your Answer
False

Multiple Choice Single Answer
Question
Which attribute holds multiple values for single entity?
Correct Answer
Multi valued attribute
Your Answer
Multi valued attribute

Select The Blank
Question
________ is one closest to the users.
Correct Answer
Logical level
Your Answer
Physical level

True/False
Question
All views are not updatable.
Correct Answer
True
Your Answer
False

Multiple Choice Single Answer
Question
(%) stands for :-
Correct Answer
Sequence of n characters in character string
Your Answer
Sequence of n characters in character string

True/False
Question
Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer
False
Your Answer
False

True/False
Question
Structural constraints are specified to force the placement of information into structures.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Immediate database modification uses :-
Correct Answer
Old Value & New Value
Your Answer
Only New Value

True/False
Question
Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer
True
Your Answer
True

Select The Blank
Question
________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
Correct Answer
Program operation independence
Your Answer
Program operation independence

Multiple Choice Multiple Answer
Question
Attributes are classified as :-
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued , Variant

Multiple Choice Single Answer
Question
Security issues become more complex in which environment?
Correct Answer
Network
Your Answer
Network

Multiple Choice Multiple Answer
Question
Set operators are as follows :-
Correct Answer
UNION , INTERSECT , MINUS
Your Answer
UNION , INTERSECT , MINUS

Multiple Choice Single Answer
Question
What will you get when Data items are grouped together?
Correct Answer
Entity
Your Answer
Data

Multiple Choice Multiple Answer
Question
The ICAM studies created lot of graphical methods for defining :-
Correct Answer
Functions , Data structures
Your Answer
Functions , Combinations , Data structures , Conditions

True/False
Question
The information collected during requirement analysis forms input for information modeling.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Security considerations apply to :-
Correct Answer
Data, database , DBMS , Users and applications
Your Answer
Users and applications , Variant , Data, database , DBMS

Multiple Choice Multiple Answer
Question
Specify any three string functions used in SQL :-
Correct Answer
initcap(char) , upper(char) , lower(char)
Your Answer
lower(char) , initcap(char) , upper(char) , stringlength(char)

Match The Following
Question
Correct Answer
Your Answer
select * from
order by

Views all columns in sorting ording by specified column_name
Views all columns in reverse order

Select * from
View all data from table.
Views all column satisfying condition in where clause

select , from


Views 2 specified column from table
Updates records which satisfy condition

select * from where
Views all column satisfying condition in where clause
Views all columns in sorting ording by specified column_name

Multiple Choice Multiple Answer
Question
Write the attributes of entity "book" :-
Correct Answer
Book_no , Book_name , Price
Your Answer
Book , Book_no , Book_name , Price

Select The Blank
Question
Database design model helps in improving________.
Correct Answer
Maintainability
Your Answer
Maintainability

Select The Blank
Question
The program which allows multiple users and programs to access the database concurrently is called ________ a database.
Correct Answer
Sharing
Your Answer
Sharing

Multiple Choice Single Answer
Question
If a data transfer failure is detected the system involves :-
Correct Answer
Recovery procedure
Your Answer
Check points

Multiple Choice Multiple Answer
Question
To be able to successfully design and maintain databases we have to do following :-
Correct Answer
Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer
Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary

True/False
Question
Wait-die scheme is based on preemptive technique.
Correct Answer
False
Your Answer
True

Multiple Choice Single Answer
Question
Backbone of any organization is :-
Correct Answer
Information
Your Answer
Information

Select The Blank
Question
A ________ is a database that can maintain information such as video, images, sounds in traditional form.
Correct Answer
Universal server
Your Answer
Server

Select The Blank
Question
An alternative technique to log based crash recovery is ________.
Correct Answer
Shadow Paging
Your Answer
Backup Mechanism

Select The Blank
Question
File is collection of ________.
Correct Answer
Records
Your Answer
Records

Multiple Choice Multiple Answer
Question
Some clauses of Revoke command are as follows :-
Correct Answer
FROM , ON
Your Answer
FROM , ON , ANY , MANY

Multiple Choice Single Answer
Question
Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
Correct Answer
Single valued
Your Answer
Single valued

Multiple Choice Multiple Answer
Question
Different E-R modeling styles are :-
Correct Answer
Rein 85 , IDEFIX , Crow's foot
Your Answer
Crow's foot , Rein 85 , IDEFIX , Functions

Multiple Choice Multiple Answer
Question
Reasons of creation of views are :-
Correct Answer
When data security is required , When data redundancy is to be kept to minimum.
Your Answer
When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required

Select The Blank
Question
Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
Correct Answer
Character string data types
Your Answer
Character string data types

Multiple Choice Multiple Answer
Question
The front end of database consists of tools such as :-
Correct Answer
Forms , Query evaluators , Graphical user interfaces
Your Answer
Forms , Query evaluators , Report writers , Graphical user interfaces

Select The Blank
Question
________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
Correct Answer
Security
Your Answer
Security

Multiple Choice Multiple Answer
Question
What are secured using authorization and access control?
Correct Answer
The intranet , Local clients , Operators
Your Answer
The intranet , Local clients , Operators , The internet

Multiple Choice Single Answer
Question
When two entities are associated then the relationship which exists is called :-
Correct Answer
Binary relationship
Your Answer
Quarterly relationship

Multiple Choice Single Answer
Question
Shadow paging technique maintains two pages during the life time of a transaction namely :-
Correct Answer
Current page & Shadow page
Your Answer
Current page & Shadow page

Multiple Choice Single Answer
Question
Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer
CURE
Your Answer
SERE

True/False
Question
A fully developed data model includes domains for each attribute in the E-R model.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Which of the following term means that the data model is not specific to any particular application?
Correct Answer
Sharebillity
Your Answer
Structured validity

Match The Following
Question
Correct Answer
Your Answer
DBA
Data base administrator
Data base administrator
UML
Unified modeling language
Unified modeling language
DBMS
Data base management system
Data base management system
RDBMS
Relational DBMS
Relational DBMS

True/False
Question
If attribute is multi-valued then single lines are used.
Correct Answer
False
Your Answer
True

Select The Blank
Question
In________there is no security of data.
Correct Answer
DBMS
Your Answer
RDBMS

Select The Blank
Question
________ is a process by which user's identity is checked.
Correct Answer
Authentication
Your Answer
Authentication

True/False
Question
If attribute is derived dotted line is used.
Correct Answer
True
Your Answer
True
Select The Blank
Question
Data types BIT and BIT VARYING are known as ________.
Correct Answer
Bit string data types
Your Answer
Bit string data types

Select The Blank
Question
A ________ is collection of tables where table is an unordered collection of rows.
Correct Answer
Relational Database
Your Answer
Relational Database

True/False
Question
Physical design is tailored to a specific DBMS system.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
WWW stands for :-
Correct Answer
World wide web
Your Answer
World wide web

Multiple Choice Multiple Answer
Question
In a two tier architecture, the software components are distributed over which two systems?
Correct Answer
Client , Server
Your Answer
Client , Server

Select The Blank
Question
________ are binary computer representations of stored logical entities.
Correct Answer
Data
Your Answer
Data

Multiple Choice Single Answer
Question
Access to a database can be controlled using :-
Correct Answer
Access Privileges
Your Answer
Access Privileges

Multiple Choice Multiple Answer
Question
Which of the following is a criterion that should be satisfied by an optimal data model?
Correct Answer
Structural validity , Express ability , Shareability
Your Answer
Structural validity , Express ability , Shareability , Maintenance of hardware system

Select The Blank
Question
A ________ is a situation, event or personnel that will adversely affect the database security and the smooth functioning of organization.
Correct Answer
Threat
Your Answer
Integrity

Multiple Choice Multiple Answer
Question
Different syntaxes used for update command in SQL are as follows :-
Correct Answer
update
set = , update

set = where

Your Answer
update from
set =


True/False
Question
Database design model help in improving maintainability.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
If role B has been previously granted to role A :-
Correct Answer
Role A cannot be granted to role B
Your Answer
Role A cannot be granted to role B

Multiple Choice Multiple Answer
Question
Write examples of dbms :-
Correct Answer
FoxBASE , FoxPro
Your Answer
FoxBASE , FoxPro , Cobol , Pascal

Multiple Choice Single Answer
Question
A database must be protected against :-
Correct Answer
Viruses
Your Answer
Viruses

Select The Blank
Question
Each attribute is associted with set of values called as________
Correct Answer
Domain
Your Answer
Domain

True/False
Question
A fuzzy checkpoint allows transactions to perform updates even while buffer blocks are being written out.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
When a particular transaction never makes progress because the data item it wants to lock is already locked and other transactions are also waiting for the same data item then it is said to be :-
Correct Answer
Starvation
Your Answer
Deadlock

True/False
Question
A program is a collections of instructions for manipulating data.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
The set of all relationships of the same type called as
Correct Answer
Relationship set
Your Answer
Relationship set

Multiple Choice Multiple Answer
Question
Deadlock prevention scheme using time stamps are:-
Correct Answer
Wait - die , Wound - wait
Your Answer
Wait - die , Wound - wait , Rollback , Starvation

Multiple Choice Multiple Answer
Question
Specify any 2 forms of insert command :-
Correct Answer
INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE
Your Answer
INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE

Multiple Choice Single Answer
Question
Which SQL statement will show contents of table book, where 2nd character of bookname is 'm' ?
Correct Answer
select * from book where bookname like '_m%'
Your Answer
select * from book where bookname like '%m_'

Select The Blank
Question
In a database for geographic information system ________ can be stored.
Correct Answer
Satellite images
Your Answer
Satellite images

Select The Blank
Question
________ is visual representation of Entity Relationships.
Correct Answer
ERD
Your Answer
Relation

Multiple Choice Multiple Answer
Question
Some clauses of GRANT command are as follows :-
Correct Answer
ALL , ON , PUBLIC
Your Answer
ALL , ON , PUBLIC

Multiple Choice Single Answer
Question
Which of the following is high level data model?
Correct Answer
Entity-Relationship model
Your Answer
Entity-Relationship model

Multiple Choice Multiple Answer
Question
Advantages of Database Management System are :-
Correct Answer
Reduced redundancy , Sharing of data , Security
Your Answer
Reduced redundancy , Sharing of data , Security , Work Space required for execution and storage is less

Select The Blank
Question
________ is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer
Access control
Your Answer
Packet sniffers

Select The Blank
Question
Diagrammatic representation in data modeling is ________ to represent a model in diagrammatic notation.
Correct Answer
Capability
Your Answer
Capability

Select The Blank
Question
Entity name is written in ________ in E-R diagram.
Correct Answer
Upper case
Your Answer
Upper case

True/False
Question
The database is partitioned into some number of fixed length block called as pages.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Following are properties of roles allowed for easier privilege management :-
Correct Answer
Application awareness , Reduced privilege administration , Dynamic privilege administration
Your Answer
Reduced privilege administration , Dynamic privilege administration , Application awareness

True/False
Question
Database is widely used in banking.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
What is many-to-one relationship between two sets of attributes of a given relation?
Correct Answer
Functional dependency
Your Answer
Functional dependency

Match The Following
Question
Correct Answer
Your Answer
Data files
Stores the database itself
Stores the database itself
Person who design and implement Database management system modules
Database Management system designers and implementers
Database Management system designers and implementers
Person who design and implement tools
Tool developers
Tool box developers
Person responsible for running and maintenance of Hardware and Software in a Database
Operators and maintenance personal
Operators and maintenance personal

Select The Blank
Question
File is collection of ________
Correct Answer
records
Your Answer
records

Multiple Choice Multiple Answer
Question
The levels of abstraction of data are :-
Correct Answer
Physical level , Logical level , View level
Your Answer
Physical level , Logical level , View level

True/False
Question
>= ' is arithmetic operator.
Correct Answer
False
Your Answer
False

True/False
Question
DES provides standards based encryption for data privacy.
Correct Answer
True
Your Answer
True

Multiple Choice Multiple Answer
Question
Block movements between disk and main memory are initiated through two operations namely :-
Correct Answer
Input , Output
Your Answer
Input , Output

Multiple Choice Single Answer
Question
What is alternative name for functions?
Correct Answer
Methods
Your Answer
Methods

Multiple Choice Multiple Answer
Question
ERD captures :-
Correct Answer
Entity type , Attributes , Relationship between entities
Your Answer
Entity type , Attributes , Relationship between entities

Match The Following
Question
Correct Answer
Your Answer
Menu driven interface
Stand alone user
Stand alone user
Query language interface
Casual user
Casual user
Programming language interface
Application user
Application user
Forms and command code
Parametric user
Parametric user

Select The Blank
Question
________are two critical phases in database development lifecycle.
Correct Answer
Data modeling and database design
Your Answer
Information and program

Multiple Choice Single Answer
Question
The set of all entities of the same type called as
Correct Answer
entity set
Your Answer
entity set

Multiple Choice Single Answer
Question
A graphical user interface typically displays a schema to the user in which form?
Correct Answer
Diagrammatic form
Your Answer
Statement form

Multiple Choice Single Answer
Question
Command to create table catalog having similar structure as book is :-
Correct Answer
CREATE TABLE CATALOG LIKE BOOK
Your Answer
CREATE STRUCTURE CATALOG LIKE BOOK
Multiple Choice Multiple Answer
Question In a two tier architecture, the software components are distributed over which two systems
Correct Answer Client , Server
Your Answer Client , Server

True/False
Question Temporal constraints can be used to limit the value of a particular attribute to be in a range
Correct Answer False
Your Answer True

Multiple Choice Multiple Answer
Question Write the attributes of entity "book"
Correct Answer book_no , Book_name , Price
Your Answer book_no , Book_name , Price

Multiple Choice Multiple Answer
Question Set operators are as follows
Correct Answer MINUS , UNION , INTERSECT
Your Answer UNION , INTERSECT , MINUS

Multiple Choice Multiple Answer
Question Three levels of database service
Correct Answer External level , Conceptual level , Physical level
Your Answer External level , Conceptual level , Internal level

Match The Following
Question Correct Answer Your Answer

Data model must know entities,relation,attributes database characteristics

shareability optimal data model's characteristics used in physical modeling

E-R model widely used conceptual model widely used conceptual model

Database design conversion into computer usable form must know entities,relation,attributes

True/False
Question Codd developed E-R model
Correct Answer False
Your Answer False

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Multiple Choice Multiple Answer
Question The levels of abstraction of data are
Correct Answer Physical level , Logical level , View level
Your Answer Physical level , Logical level

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question An example of non-volatile storage is :
Correct Answer Magnetic Tapes
Your Answer Magnetic Tapes

Multiple Choice Single Answer
Question Security issues become more complex in which environment
Correct Answer Network
Your Answer Network

Multiple Choice Multiple Answer
Question Functions at the server end are
Correct Answer Query , Transaction
Your Answer Query , Transaction , Application Program

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued

Multiple Choice Single Answer
Question What is UML models(E-R models entities)
Correct Answer Objects
Your Answer Objects

Multiple Choice Single Answer
Question Write command "to grant update authority on price column of catalogue to user "Smita"
Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

True/False
Question In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer False
Your Answer False

Multiple Choice Multiple Answer
Question The functions of Database adminstrator are
Correct Answer Authorization for data access , Schema definition , Maintenance of Database
Your Answer Authorization for data access , Maintenance of Database

Multiple Choice Single Answer
Question What expresses the specific number of entity occurances associated with one occurance of related entity?
Correct Answer Cardinality
Your Answer Cardinality

Multiple Choice Multiple Answer
Question Write examples of dbms
Correct Answer Foxbase , foxpro
Your Answer Foxbase , foxpro

Select The Blank
Question ________is a process by which the user's privileges are ascertained
Correct Answer Authorisation
Your Answer Authorisation

Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer Integrity constraints , Database triggers

Multiple Choice Single Answer
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer entity set

Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case

Select The Blank
Question The first commercial RDBMS was ________from Relational Software Inc.
Correct Answer ORACLE
Your Answer ORACLE

Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer functions

True/False
Question You cannot grant or revoke system privileges to users and roles.
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm'
Correct Answer select * from book where bookname like '_m%'
Your Answer select * from book where bookname like '_m%'

Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer DBMS

Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer records

Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer Relationship set

Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program

Multiple Choice Multiple Answer
Question Which of the following are valid SQL commands.
Correct Answer ALTER , UPDATE
Your Answer ALTER , UPDATE

Multiple Choice Single Answer
Question DDL stands for
Correct Answer Data definition language
Your Answer Data definition language

Multiple Choice Single Answer
Question A person who has control over system is called as
Correct Answer Database administrator
Your Answer Database administrator

Multiple Choice Multiple Answer
Question What are secured using authorisation and access control.
Correct Answer The intranet , local clients , opearators
Your Answer The intranet , local clients , opearators

Multiple Choice Single Answer
Question What is nothing but refined data
Correct Answer Information
Your Answer Information

True/False
Question A database may include varieties of data that are interrelated in many ways.
Correct Answer True
Your Answer True

Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Select The Blank
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer independent

Multiple Choice Multiple Answer
Question Attributes are classified as
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued

Match The Following
Question Correct Answer Your Answer

select * from
order by
Views all columns in sorting ording by specified column_name Views all columns in sorting ording by specified column_name

Select * from View all data from table. View all data from table.

select , from

Views 2 specified column from table Views 2 specified column from table

select * from where Views all column satisfying condition in where clause Views all column satisfying condition in where clause

Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char)

Multiple Choice Single Answer
Question To enter new field city in the table 'branch_master' following command is used
Correct Answer alter table branch_master add(city varchar2(25))
Your Answer alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer
Question Malfunctioning of the hardware, or bug in the database software or operating system is called as
Correct Answer System Crash
Your Answer System Crash

Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data

Multiple Choice Multiple Answer
Question Advantages of Database Management System
Correct Answer Reduced redundancy , Sharing of data , Security
Your Answer Reduced redundancy , Sharing of data , Work Space required for execution and storage is less

Multiple Choice Single Answer
Question When two entities are associated then the relationship exists is called :
Correct Answer binary relationship
Your Answer binary relationship

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer True

Multiple Choice Single Answer
Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION

Select The Blank
Question ________published the paper "Relational Model of Data for Large Shared Data Banks "
Correct Answer F.Codd
Your Answer F.Codd

Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer Rectangular box

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Match The Following
Question Correct Answer Your Answer

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool developers

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal

True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question Write command "to grant update authority on price column of catalogue to user "Smita"
Correct Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

Select The Blank
Question ________provides a graphical means of modeling various components of software system
Correct Answer UML
Your Answer UML

Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control

Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation
Correct Answer Functional dependency
Your Answer Functional dependency

True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer False

True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Your Answer True
DATABASE MANAGEMENT SYSTEMS

Multiple Choice Multiple Answer
Question Following date formats used in oracle
Correct Answer TO_CHAR() , TO_DATE()
Your Answer TO_DATE()

Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity

Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Identify relationship between objects , Data dictionary

True/False
Question The data in the database cannot be shared
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation
Correct Answer Functional dependency
Your Answer Functional dependency

Multiple Choice Single Answer
Question When an attribute composed of multiple components, each with an independent existence is called as
Correct Answer composite attribute
Your Answer composite attribute

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer True

Match The Following
Question Correct Answer Your Answer

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool box developers


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Multiple Choice Single Answer
Question Which of the following term means the ability to represent a model using esily understood diagrammatic notation
Correct Answer Diagrammatic representation
Your Answer Diagrammatic representation

Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char)

Multiple Choice Single Answer
Question One method of protecting the privacy and integrity of a system is to place a firewall between internet and
Correct Answer Public network
Your Answer intranet

True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True

Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model

True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer False

True/False
Question The shadow page table is never changed over the duration of the transaction
Correct Answer True
Your Answer True

True/False
Question The Database administrator cannot grant or revoke privileges to users.
Correct Answer False
Your Answer False

Multiple Choice Single Answer
Question Write a command to grant all privileges on BOOK TABLE to user "Mathews"
Correct Answer GRANT ALL ON BOOK TO MATHEWS
Your Answer GRANT ALL ON BOOK TO MATHEWS

Multiple Choice Single Answer
Question Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer john
Your Answer john

Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control

Multiple Choice Single Answer
Question Write SQL statement, which shows contents of table book, whose price is less than 4000 and more than 1000
Correct Answer select * from book where price>1000 and price<4000 Your Answer select * from book where price>1000 and price<4000 Multiple Choice Multiple Answer Question There are two kinds of tables - Correct Answer base tables , views Your Answer base tables , system Match The Following Question Correct Answer Your Answer Integrity hallmark of data security hallmark of data security Authorisation permission given to user Provide authority Previlege Permission for accessing objects permission given to user Role Provide authority Permission for accessing objects True/False Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY'; Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Specify any 2 forms of insert command Correct Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE Your Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE Multiple Choice Multiple Answer Question Following are properties of roles allowed for easier privilege management Correct Answer Reduced privilege administration , Dynamic privilege administration , application awareness Your Answer Dynamic privilege administration , Deletion of information Multiple Choice Multiple Answer Question Strong entities are also called as Correct Answer dominant , Parent , owner Your Answer Parent True/False Question A user can grant any object privilege on any object he or she owns to any other user or role Correct Answer True Your Answer True Multiple Choice Multiple Answer Question Security considerations apply to Correct Answer data, database , dbms , users and applications Your Answer data, database , dbms , users and applications Select The Blank Question ________regulates all user access to named objects through privileges Correct Answer Discretionary access control Your Answer Discretionary access control True/False Question Distinct clause in select command eliminates rows that have exactly same contents in each column. Correct Answer True Your Answer True Multiple Choice Single Answer Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL Correct Answer CURE Your Answer RE True/False Question A relational model relates records by the value that they contain. Correct Answer True Your Answer False Select The Blank Question In________there is no security of data Correct Answer DBMS Your Answer DBMS Multiple Choice Multiple Answer Question A Database Management System has several subsystems Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem Select The Blank Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object Correct Answer functions Your Answer functions Select The Blank Question In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language Correct Answer ANSI American national std institute Your Answer ANSI American national std institute Multiple Choice Multiple Answer Question The different types of database users Correct Answer Security officers , Database administrators , Network administrators Your Answer Database administrators , Database operators Select The Blank Question Each attribute is associted with set of values called as________ Correct Answer Domain Your Answer Relation Multiple Choice Single Answer Question Access to a database can be controlled using Correct Answer Access Privilages Your Answer Access control Select The Blank Question Structctural validity in data modeling means ________ Correct Answer consistency Your Answer consistency Select The Blank Question ________ is tailored to specific DBMS system Correct Answer Physical design Your Answer Physical design Multiple Choice Single Answer Question In an Entity relationship diagram total participation of an entity in a relationship set is indicated by : Correct Answer Double line Your Answer Double ellipse Multiple Choice Multiple Answer Question The ICAM studies created lot of graphical methods for defining Correct Answer Functions , Data structures Your Answer Data structures Select The Blank Question Enitity name is written in ________in E-R diagram Correct Answer upper case Your Answer upper case Multiple Choice Single Answer Question Write the use of UPDATE command Correct Answer To change or to modify data values in table Your Answer To change or to modify data values in table Select The Blank Question ________published the paper "Relational Model of Data for Large Shared Data Banks " Correct Answer F.Codd Your Answer F.Codd Select The Blank Question Database design model helps in improving________ Correct Answer maintainability Your Answer maintainability Multiple Choice Multiple Answer Question SSL protocol provides Correct Answer authorisation , data encryption , data integrity Your Answer authorisation , data encryption , security True/False Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY'; Correct Answer True Your Answer False Multiple Choice Single Answer Question Class room entity has single value for room_no attribute so room_no attriute is reffered to as Correct Answer Single valued Your Answer Single valued Multiple Choice Single Answer Question Which type of attribute represents a value that is derivable from the value of related attribute Correct Answer derived attribute Your Answer derived attribute Multiple Choice Multiple Answer Question Some clauses of Revoke command are as follows Correct Answer FROM , ON Your Answer FROM , ON , ANY Select The Blank Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization Correct Answer Threat Your Answer Threat Multiple Choice Single Answer Question In an Entity relationship diagram, what is used to link attributes to entity sets and entity sets to relationships? Correct Answer Line Your Answer Line Select The Blank Question ________are binary computer representations of stored logical entities Correct Answer Data Your Answer Data Select The Blank Question Enitity name is written in ________in E-R diagram Correct Answer upper case Your Answer upper case Multiple Choice Single Answer Question (%) stands for Correct Answer Sequence of n characters in character string Your Answer Sequence of n characters in character string Select The Blank Question ________are collection of instructions for manipulating data Correct Answer program Your Answer program Select The Blank Question ________means data is protected from deletion and corruption, both while it resides within database Correct Answer Data integrity Your Answer Data integrity Match The Following Question Correct Answer Your Answer Menu driven interface Stand alone user Stand alone user Query language interface Casual user Casual user Programming language interface Application user DBA Forms and command code Parametric user Parametric user Select The Blank Question In________there is no security of data Correct Answer DBMS Your Answer DML Multiple Choice Multiple Answer Question Which of the following are valid SQL commands. Correct Answer ALTER , UPDATE Your Answer ALTER , UPDATE Select The Blank Question ________is a process by which user's identity is checked Correct Answer Authentication Your Answer Authentication Select The Blank Question Entities are represented in ________in E-R diagram Correct Answer Rectangular box Your Answer square box Select The Blank Question File is collection of ________ Correct Answer records Your Answer Data Multiple Choice Single Answer Question WWW stands for Correct Answer World wide web Your Answer World wide web Select The Blank Question The most widely used conceptual model is________ Correct Answer E-R model Your Answer E-R model Select The Blank Question ________provides a graphical means of modeling various components of software system Correct Answer UML Your Answer ERD True/False Question SQL is low level language Correct Answer False Your Answer False Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer Data integrity True/False Question Centralised Database Management cannot support multiple users. Correct Answer False Your Answer False Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Integrity constraints , Database triggers Your Answer security , Integrity constraints , Database triggers True/False Question Unary operator operates only on one operand. Correct Answer True Your Answer True


Multiple Choice Multiple Answer
Question
Security considerations apply to
Correct Answer
users and applications , data, database , dbms
Your Answer
data, database , dbms , users and applications

Select The Blank
Question
________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer
Access control
Your Answer
Access control

Multiple Choice Multiple Answer
Question
Advantages of Database Management System
Correct Answer
Reduced redundancy , Sharing of data , Security
Your Answer
Reduced redundancy , Sharing of data , Security , Work Space required for execution and storage is less

Multiple Choice Multiple Answer
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to select rows from another user's table
Your Answer
The right to connect the database , The right to create table , System programming

True/False
Question
You cannot grant or revoke system privileges to users and roles.
Correct Answer
False
Your Answer
False

True/False
Question
Centralised Database Management cannot support multiple users.
Correct Answer
False
Your Answer
False

Match The Following
Question
Correct Answer
Your Answer
Menu driven interface
Stand alone user
Query language interface
Casual user
DBA
Programming language interface
Application user
Application user
Forms and command code
Parametric user
Storage Manager

Multiple Choice Multiple Answer
Question
Different syntaxes used for update command in SQL are as follows.
Correct Answer
update
set = , update
set = where
Your Answer
update
set = where

Multiple Choice Multiple Answer
Question
Some examples of select command are as following using emp_table
Correct Answer
select * from emp; , select empno,name from emp , select empno,name from emp where salary in(9000,10000);
Your Answer
select * from emp; , select empno,name from emp where salary in(9000,10000);

Multiple Choice Multiple Answer
Question
Strong entities are also called as
Correct Answer
dominant , Parent , owner
Your Answer
dominant , owner

Multiple Choice Multiple Answer
Question
Specify any three string functions used in SQL
Correct Answer
lower(char) , initcap(char) , upper(char)
Your Answer
lower(char) , upper(char) , stringlength(char)

Multiple Choice Single Answer
Question
What will you get when Data items are grouped together.
Correct Answer
Entity
Your Answer
Entity

Select The Blank
Question
A________ mechanism that can be used to provide authorization
Correct Answer
role
Your Answer
role

Multiple Choice Multiple Answer
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to select rows from another user's table
Your Answer
The right to connect the database , The right to create table , The right to select rows from another user's table , System programming

Multiple Choice Single Answer
Question
In order to implement checkpoint the log is checked :
Correct Answer
Backwards
Your Answer
Backwards

Multiple Choice Single Answer
Question
( _ ) stands for
Correct Answer
any single character in character string
Your Answer
any single character in character string

True/False
Question
A role provides authorisation.
Correct Answer
True
Your Answer
True

Select The Blank
Question
Entities are represented in ________in E-R diagram
Correct Answer
Rectangular box
Your Answer
square box

True/False
Question
The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer
False
Your Answer
True

Multiple Choice Single Answer
Question
One method of protecting the privacy and integrity of a system is to place a firewall between internet and
Correct Answer
Public network
Your Answer
intranet

True/False
Question
SQL is low level language
Correct Answer
False
Your Answer
True

True/False
Question
To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer
True
Your Answer
True

Select The Blank
Question
________are binary computer representations of stored logical entities
Correct Answer
Data
Your Answer
Program

Multiple Choice Single Answer
Question
Degree of relationship indicates no of associated -
Correct Answer
Entities
Your Answer
Entities

Multiple Choice Single Answer
Question
To enter new field city in the table 'branch_master' following command is used
Correct Answer
alter table branch_master add(city varchar2(25))
Your Answer
alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer
Question
The set of all relationships of the same type called as
Correct Answer
Relationship set
Your Answer
Relationship set

True/False
Question
In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access.
Correct Answer
False
Your Answer
False

Select The Blank
Question
UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer
functions
Your Answer
functions

True/False
Question
A role provides authorisation.
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
Data can be inserted by row in a table following command can be used.
Correct Answer
INSERT
Your Answer
INSERT

Select The Blank
Question
________is a process by which the user's privileges are ascertained
Correct Answer
Authorisation
Your Answer
Authentication

True/False
Question
Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer
False
Your Answer
False

Select The Blank
Question
The information collected in requirement analysis stage is ________for information modeling
Correct Answer
input
Your Answer
input

Multiple Choice Multiple Answer
Question
Attributes are classified as
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued

Multiple Choice Single Answer
Question
In three tier architecture, the layer which provides user interface and interacts with the user is :
Correct Answer
Presentation layer
Your Answer
Presentation layer

Match The Following
Question
Correct Answer
Your Answer
Authorisation
permission given to user
Provide authority
Previlege
Permission for accessing objects
Permission for accessing objects
Role
Provide authority
permission given to user
Integrity
hallmark of data security
hallmark of data security

Multiple Choice Single Answer
Question
Overheads can be reduced by is introducing :
Correct Answer
checkpoints
Your Answer
checkpoints

Multiple Choice Multiple Answer
Question
What are secured using authorisation and access control.
Correct Answer
The intranet , local clients , opearators
Your Answer
The intranet , the internet

Multiple Choice Single Answer
Question
Which type of attribute holds single value for single entity?
Correct Answer
single valued attribute
Your Answer
simple attribute

Select The Blank
Question
________regulates all user access to named objects through privileges
Correct Answer
Discretionary access control
Your Answer
System access control

Multiple Choice Multiple Answer
Question
Which of the following are object oriented features
Correct Answer
Inheritance , Abstraction
Your Answer
Inheritance , Polymerisation

Multiple Choice Multiple Answer
Question
Three levels of database service
Correct Answer
External level , Conceptual level , Physical level
Your Answer
External level , Conceptual level , Physical level

Select The Blank
Question
The most widely used conceptual model is________
Correct Answer
E-R model
Your Answer
E-R model

Select The Blank
Question
A________ mechanism that can be used to provide authorization
Correct Answer
role
Your Answer
role

Select The Blank
Question
A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer
Threat
Your Answer
Threat

True/False
Question
Using database redumdancy can be removed
Correct Answer
True
Your Answer
True

Multiple Choice Single Answer
Question
What is alternative name for functions
Correct Answer
methods
Your Answer
programs
Multiple Choice Single Answer
Question Write a command to remove all privileges on catalogue table from user "Mathew" :-
Correct Answer REVOKE ALL ON CATALOGUE FROM MATHEWS
Your Answer REVOKE ALL ON CATALOGUE FROM MATHEWS


Multiple Choice Multiple Answer
Question Major difficulties in referring to the log is :-
Correct Answer Time Consuming , Redoing transactions which have already written their updates to the database
Your Answer Time Consuming , Redoing transactions which have already written their updates to the database


Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer Rectangular box


True/False
Question SQL is low level language.
Correct Answer False
Your Answer False


Select The Blank
Question The information collected in requirement analysis stage is ________ for information modeling.
Correct Answer Input
Your Answer Processing


Multiple Choice Single Answer
Question The SQL statement, which will show contents of table book, where last character of bookname is 'm' is :-
Correct Answer select * from book where bookname like '%m'
Your Answer select * from book where bookname like '%m'


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA?
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , Contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , Contacting dbms vendor for technical support


True/False
Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Write a command to remove update authority on price and year columns of the catalog tables from user "Alexis" :-
Correct Answer REVOKE UPDATE(PRICE,YEAR) ON CATALOG FROM ALEXIS
Your Answer REVOKE UPDATE(PRICE,YEAR) ON CATALOG FROM ALEXIS


True/False
Question Internal schema means how and where data are organized in physical data storage.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Functions at the server end are :-
Correct Answer Query , Transaction
Your Answer Transaction , User interface , Application Program


Select The Blank
Question The users of the database don't have to worry about ________of the database.
Correct Answer Internal working
Your Answer Internal working


Multiple Choice Single Answer
Question Each role granted to a user is :-
Correct Answer Enabled or disabled
Your Answer Enabled or disabled


True/False
Question A user can grant any object privilege on any object he or she owns to any other user or role.
Correct Answer True
Your Answer True


Select The Blank
Question The current page changes when the transaction performs a ________ operation.
Correct Answer Write
Your Answer Modify


True/False
Question You cannot grant or revoke system privileges to users and roles.
Correct Answer False
Your Answer False


Multiple Choice Multiple Answer
Question Requirement analysis includes :-
Correct Answer Human factors of applications , Application's functionality , All information used by application
Your Answer Human factors of applications , Application's functionality , All information used by application


Select The Blank
Question ________provides a graphical means of modeling various components of software system
Correct Answer UML
Your Answer UML


Multiple Choice Single Answer
Question Transaction which can no longer continue with normal execution because of internal conditions such as bad input, data not found, overflow are called as :-
Correct Answer Logical Error
Your Answer Logical Error


Select The Blank
Question ________ is a process by which the user's privileges are ascertained.
Correct Answer Authorization
Your Answer Authorization


Multiple Choice Multiple Answer
Question Write names of high level languages :-
Correct Answer COBOL , Pascal
Your Answer COBOL , Pascal


Multiple Choice Single Answer
Question Write output of following example SELECT initcap('JOHN MARTIN') FROM DUAL;
Correct Answer John Martin
Your Answer john martin


True/False
Question Unary operator operates only on one operand.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Which type of attribute represents a value that is derivable from the value of related attribute?
Correct Answer Derived attribute
Your Answer Derived attribute


Multiple Choice Multiple Answer
Question The functions of Database administrator are :-
Correct Answer Authorization for data access , Schema definition , Maintenance of Database
Your Answer Authorization for data access , Schema definition , Maintenance of Database


True/False
Question A relational model relates records by the value that they contain.
Correct Answer True
Your Answer True


Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program


Select The Blank
Question In________there is no security of data
Correct Answer DBMS
Your Answer RDBMS


Multiple Choice Multiple Answer
Question Application development tools are :-
Correct Answer Power Builder , VB
Your Answer Oracle


Select The Blank
Question SQL as a language is ________ of the way it is implemented internally.
Correct Answer Independent
Your Answer Different


Multiple Choice Multiple Answer
Question Different types of log based recovery are:-
Correct Answer Deferred database modification , Immediate database modification , Checkpoints
Your Answer Deferred database modification , Immediate database modification , Checkpoints


Multiple Choice Multiple Answer
Question Which of the following are object oriented features?
Correct Answer Abstraction , Inheritance
Your Answer Inheritance , Abstraction


Multiple Choice Multiple Answer
Question The interface between the front end and the back end is through :-
Correct Answer SQL , Application program
Your Answer SQL , Application program , Assembly language , Data Definition language


Match The Following
Question Correct Answer Your Answer

Relationship Constraints Relationship between entities Relationship between entities

Temporal constraints Time period validation Time period validation

Structural constraints Data structures Data structures

Range constraints Limit values of attributes Limit values of attributes



Select The Blank
Question An entity that does not have sufficient attributes to form a primary key is termed ________.
Correct Answer Weak entity set
Your Answer Weak entity set


True/False
Question The shadow page table is never changed over the duration of the transaction.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Write output of following example SELECT lower('JOHN MARTIN') FROM DUAL;
Correct Answer john martin
Your Answer john martin


Match The Following
Question Correct Answer Your Answer

E-R diagram Similar to class diagram Similar to class diagram

Use case Interaction between users and system Interaction between users and system

Activity diagrams Flow of tasks between components Flow of tasks between components

Implementation diagram System components and their connection System components and their connection



True/False
Question If company policy does not support more than 100 employees in a department. So Dept-Emp relationship is "one to many relationship".
Correct Answer True
Your Answer True


Select The Blank
Question In 1978 the ________ approved the SQL database language project which led to the formulation of the initial SQL standard language.
Correct Answer ANSI American national std institute
Your Answer ANSI American national std institute


Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer functions


Multiple Choice Single Answer
Question The command to revoke the system privileges for creating tables from 'Smita' is :-
Correct Answer REVOKE CREATE TABLE FROM SMITA
Your Answer REVOKE TABLE CREATE FROM SMITA


Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case


Select The Blank
Question In an Entity ________ data model Relationship is an association among several entities.
Correct Answer Relationship
Your Answer Relationship


Select The Blank
Question A ________ mechanism that can be used to provide authorization.
Correct Answer Role
Your Answer Role


Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Program


Select The Blank
Question The most widely used conceptual model is________.
Correct Answer E-R model
Your Answer E-R model
LIST OF ATTEMPTED QUESTIONS AND ANSWERS


True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question Which attribute holds multiple values for single entity?
Correct Answer Multi valued attribute
Your Answer Multi valued attribute


Select The Blank
Question ________ is one closest to the users.
Correct Answer Logical level
Your Answer Physical level


True/False
Question All views are not updatable.
Correct Answer True
Your Answer False


Multiple Choice Single Answer
Question (%) stands for :-
Correct Answer Sequence of n characters in character string
Your Answer Sequence of n characters in character string


True/False
Question Logical 'OR' operator returns true if both component conditions are true otherwise returns false
Correct Answer False
Your Answer False


True/False
Question Structural constraints are specified to force the placement of information into structures.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Immediate database modification uses :-
Correct Answer Old Value & New Value
Your Answer Only New Value


True/False
Question Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer True
Your Answer True


Select The Blank
Question ________ is there when a user application program can operate on the data, regardless of how the operations are implemented.
Correct Answer Program operation independence
Your Answer Program operation independence


Multiple Choice Multiple Answer
Question Attributes are classified as :-
Correct Answer Simple , Composite , Multivalued
Your Answer Simple , Composite , Multivalued , Variant


Multiple Choice Single Answer
Question Security issues become more complex in which environment?
Correct Answer Network
Your Answer Network


Multiple Choice Multiple Answer
Question Set operators are as follows :-
Correct Answer UNION , INTERSECT , MINUS
Your Answer UNION , INTERSECT , MINUS


Multiple Choice Single Answer
Question What will you get when Data items are grouped together?
Correct Answer Entity
Your Answer Data


Multiple Choice Multiple Answer
Question The ICAM studies created lot of graphical methods for defining :-
Correct Answer Functions , Data structures
Your Answer Functions , Combinations , Data structures , Conditions


True/False
Question The information collected during requirement analysis forms input for information modeling.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Security considerations apply to :-
Correct Answer Data, database , DBMS , Users and applications
Your Answer Users and applications , Variant , Data, database , DBMS


Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL :-
Correct Answer initcap(char) , upper(char) , lower(char)
Your Answer lower(char) , initcap(char) , upper(char) , stringlength(char)


Match The Following
Question Correct Answer Your Answer

select * from
order by
Views all columns in sorting ording by specified column_name Views all columns in reverse order

Select * from View all data from table. Views all column satisfying condition in where clause

select , from

Views 2 specified column from table Updates records which satisfy condition

select * from where Views all column satisfying condition in where clause Views all columns in sorting ording by specified column_name



Multiple Choice Multiple Answer
Question Write the attributes of entity "book" :-
Correct Answer Book_no , Book_name , Price
Your Answer Book , Book_no , Book_name , Price


Select The Blank
Question Database design model helps in improving________.
Correct Answer Maintainability
Your Answer Maintainability


Select The Blank
Question The program which allows multiple users and programs to access the database concurrently is called ________ a database.
Correct Answer Sharing
Your Answer Sharing


Multiple Choice Single Answer
Question If a data transfer failure is detected the system involves :-
Correct Answer Recovery procedure
Your Answer Check points


Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following :-
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Hardware manipulations , Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary


True/False
Question Wait-die scheme is based on preemptive technique.
Correct Answer False
Your Answer True


Multiple Choice Single Answer
Question Backbone of any organization is :-
Correct Answer Information
Your Answer Information


Select The Blank
Question A ________ is a database that can maintain information such as video, images, sounds in traditional form.
Correct Answer Universal server
Your Answer Server


Select The Blank
Question An alternative technique to log based crash recovery is ________.
Correct Answer Shadow Paging
Your Answer Backup Mechanism


Select The Blank
Question File is collection of ________.
Correct Answer Records
Your Answer Records


Multiple Choice Multiple Answer
Question Some clauses of Revoke command are as follows :-
Correct Answer FROM , ON
Your Answer FROM , ON , ANY , MANY


Multiple Choice Single Answer
Question Class room entity has single value for room_no attribute so room_no attribute is referred to as :-
Correct Answer Single valued
Your Answer Single valued


Multiple Choice Multiple Answer
Question Different E-R modeling styles are :-
Correct Answer Rein 85 , IDEFIX , Crow's foot
Your Answer Crow's foot , Rein 85 , IDEFIX , Functions


Multiple Choice Multiple Answer
Question Reasons of creation of views are :-
Correct Answer When data security is required , When data redundancy is to be kept to minimum.
Your Answer When data security is required , When data redundancy is to be kept to minimum. , To remove or to change all data , When sharing of data is required


Select The Blank
Question Data types CHARACTER AND CHARACTER VARYING are known collectively as ________.
Correct Answer Character string data types
Your Answer Character string data types


Multiple Choice Multiple Answer
Question The front end of database consists of tools such as :-
Correct Answer Forms , Query evaluators , Graphical user interfaces
Your Answer Forms , Query evaluators , Report writers , Graphical user interfaces


Select The Blank
Question ________ is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based.
Correct Answer Security
Your Answer Security


Multiple Choice Multiple Answer
Question What are secured using authorization and access control?
Correct Answer The intranet , Local clients , Operators
Your Answer The intranet , Local clients , Operators , The internet


Multiple Choice Single Answer
Question When two entities are associated then the relationship which exists is called :-
Correct Answer Binary relationship
Your Answer Quarterly relationship


Multiple Choice Single Answer
Question Shadow paging technique maintains two pages during the life time of a transaction namely :-
Correct Answer Current page & Shadow page
Your Answer Current page & Shadow page


Multiple Choice Single Answer
Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer CURE
Your Answer SERE


True/False
Question A fully developed data model includes domains for each attribute in the E-R model.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Which of the following term means that the data model is not specific to any particular application?
Correct Answer Sharebillity
Your Answer Structured validity


Match The Following
Question Correct Answer Your Answer

DBA Data base administrator Data base administrator

UML Unified modeling language Unified modeling language

DBMS Data base management system Data base management system

RDBMS Relational DBMS Relational DBMS



True/False
Question If attribute is multi-valued then single lines are used.
Correct Answer False
Your Answer True


Select The Blank
Question In________there is no security of data.
Correct Answer DBMS
Your Answer RDBMS


Select The Blank
Question ________ is a process by which user's identity is checked.
Correct Answer Authentication
Your Answer Authentication


True/False
Question If attribute is derived dotted line is used.
Correct Answer True
Your Answer True
Select The Blank
Question Data types BIT and BIT VARYING are known as ________.
Correct Answer Bit string data types
Your Answer Bit string data types


Select The Blank
Question A ________ is collection of tables where table is an unordered collection of rows.
Correct Answer Relational Database
Your Answer Relational Database


True/False
Question Physical design is tailored to a specific DBMS system.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question WWW stands for :-
Correct Answer World wide web
Your Answer World wide web


Multiple Choice Multiple Answer
Question In a two tier architecture, the software components are distributed over which two systems?
Correct Answer Client , Server
Your Answer Client , Server


Select The Blank
Question ________ are binary computer representations of stored logical entities.
Correct Answer Data
Your Answer Data


Multiple Choice Single Answer
Question Access to a database can be controlled using :-
Correct Answer Access Privileges
Your Answer Access Privileges


Multiple Choice Multiple Answer
Question Which of the following is a criterion that should be satisfied by an optimal data model?
Correct Answer Structural validity , Express ability , Shareability
Your Answer Structural validity , Express ability , Shareability , Maintenance of hardware system


Select The Blank
Question A ________ is a situation, event or personnel that will adversely affect the database security and the smooth functioning of organization.
Correct Answer Threat
Your Answer Integrity


Multiple Choice Multiple Answer
Question Different syntaxes used for update command in SQL are as follows :-
Correct Answer update
set = , update
set = where
Your Answer update from
set =


True/False
Question Database design model help in improving maintainability.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question If role B has been previously granted to role A :-
Correct Answer Role A cannot be granted to role B
Your Answer Role A cannot be granted to role B


Multiple Choice Multiple Answer
Question Write examples of dbms :-
Correct Answer FoxBASE , FoxPro
Your Answer FoxBASE , FoxPro , Cobol , Pascal


Multiple Choice Single Answer
Question A database must be protected against :-
Correct Answer Viruses
Your Answer Viruses


Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain


True/False
Question A fuzzy checkpoint allows transactions to perform updates even while buffer blocks are being written out.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question When a particular transaction never makes progress because the data item it wants to lock is already locked and other transactions are also waiting for the same data item then it is said to be :-
Correct Answer Starvation
Your Answer Deadlock


True/False
Question A program is a collections of instructions for manipulating data.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer Relationship set


Multiple Choice Multiple Answer
Question Deadlock prevention scheme using time stamps are:-
Correct Answer Wait - die , Wound - wait
Your Answer Wait - die , Wound - wait , Rollback , Starvation


Multiple Choice Multiple Answer
Question Specify any 2 forms of insert command :-
Correct Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE
Your Answer INSERT INTO SELECT , FROM , INSERT INTO SELECT , FROM WHERE


Multiple Choice Single Answer
Question Which SQL statement will show contents of table book, where 2nd character of bookname is 'm' ?
Correct Answer select * from book where bookname like '_m%'
Your Answer select * from book where bookname like '%m_'


Select The Blank
Question In a database for geographic information system ________ can be stored.
Correct Answer Satellite images
Your Answer Satellite images


Select The Blank
Question ________ is visual representation of Entity Relationships.
Correct Answer ERD
Your Answer Relation


Multiple Choice Multiple Answer
Question Some clauses of GRANT command are as follows :-
Correct Answer ALL , ON , PUBLIC
Your Answer ALL , ON , PUBLIC


Multiple Choice Single Answer
Question Which of the following is high level data model?
Correct Answer Entity-Relationship model
Your Answer Entity-Relationship model


Multiple Choice Multiple Answer
Question Advantages of Database Management System are :-
Correct Answer Reduced redundancy , Sharing of data , Security
Your Answer Reduced redundancy , Sharing of data , Security , Work Space required for execution and storage is less


Select The Blank
Question ________ is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Packet sniffers


Select The Blank
Question Diagrammatic representation in data modeling is ________ to represent a model in diagrammatic notation.
Correct Answer Capability
Your Answer Capability


Select The Blank
Question Entity name is written in ________ in E-R diagram.
Correct Answer Upper case
Your Answer Upper case


True/False
Question The database is partitioned into some number of fixed length block called as pages.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Following are properties of roles allowed for easier privilege management :-
Correct Answer Application awareness , Reduced privilege administration , Dynamic privilege administration
Your Answer Reduced privilege administration , Dynamic privilege administration , Application awareness


True/False
Question Database is widely used in banking.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question What is many-to-one relationship between two sets of attributes of a given relation?
Correct Answer Functional dependency
Your Answer Functional dependency


Match The Following
Question Correct Answer Your Answer

Data files Stores the database itself Stores the database itself

Person who design and implement Database management system modules Database Management system designers and implementers Database Management system designers and implementers

Person who design and implement tools Tool developers Tool box developers

Person responsible for running and maintenance of Hardware and Software in a Database Operators and maintenance personal Operators and maintenance personal



Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer records


Multiple Choice Multiple Answer
Question The levels of abstraction of data are :-
Correct Answer Physical level , Logical level , View level
Your Answer Physical level , Logical level , View level


True/False
Question >= ' is arithmetic operator.
Correct Answer False
Your Answer False


True/False
Question DES provides standards based encryption for data privacy.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Block movements between disk and main memory are initiated through two operations namely :-
Correct Answer Input , Output
Your Answer Input , Output


Multiple Choice Single Answer
Question What is alternative name for functions?
Correct Answer Methods
Your Answer Methods


Multiple Choice Multiple Answer
Question ERD captures :-
Correct Answer Entity type , Attributes , Relationship between entities
Your Answer Entity type , Attributes , Relationship between entities


Match The Following
Question Correct Answer Your Answer

Menu driven interface Stand alone user Stand alone user

Query language interface Casual user Casual user

Programming language interface Application user Application user

Forms and command code Parametric user Parametric user



Select The Blank
Question ________are two critical phases in database development lifecycle.
Correct Answer Data modeling and database design
Your Answer Information and program


Multiple Choice Single Answer
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer entity set


Multiple Choice Single Answer
Question A graphical user interface typically displays a schema to the user in which form?
Correct Answer Diagrammatic form
Your Answer Statement form


Multiple Choice Single Answer
Question Command to create table catalog having similar structure as book is :-
Correct Answer CREATE TABLE CATALOG LIKE BOOK
Your Answer CREATE STRUCTURE CATALOG LIKE BOOK






"To view papers click to above link or "+""