DBMS
1. Each Value in a field represents multiple data types: False
2. Relational algebra is : An algebraic language, The operators operate on relations, queries are
expressed without applying special operators to relations
3. SQL can : Define the structure, modify data, specify security constraints
4. A Report is an effective way to print data in a printed form.
5. An entity that does not possess sufficient attributes to form a primary key is called : Weak entity
set
6. The notations for representing the types of operations which can be performed on relational
databases is called as : Relational Algebra
7. Standard attributes are attributes of a relation Ri that are not keys : True
8. Example of constraints are : Primary Key, Foreign key, check constraints
9. A not null constraints make it mandatory for the user to Enter some value
10. The 3NF will not be in BCNF if : There are multiple candidate key, the keys are composed of
multiple attributes, there are common attributes between keys
11. The union operation returns the union of which two relations : Compatible
12. Key words associated with MS-Access are : Database, Table, Fields
13. Who has introduced the relational model : Dr E.F Codd
14. Codd suggested that database should save single value and multiple value data in the same table
: True
15. In normalization updates can be quickly performed with adequate risk of data becoming
inconsistent : False
16. Every transaction is a unit of both : Atomicity and consistency
17. Double click on design view display columns like : Field name, data type, description
18. Select clause : Corresponds to selection; From clause : It lists the relations to be scanned; where
clause : used to list the attributes desired; exits : uses subquery as a condition
19. Sql provides a mechanism for renaming both relations and attributes, this can be done by rename
operation
20. A view is effectively a sql query stored in the Catalog
21. Which statement is used to modify the data in the table : update
22. A simple drop down to a line will help in : adding a row
23. What is equijoin : it is also called as innerjoin, it is join with a condition containing an equality
operator, it combines rows that have equivalent value for the specified columns
24. In natural join duplicates are removed as in all relation operators : True
25. Data types are different catagories within a table
26. A transaction is recorded in a log : True
27. A trigger has to be : implement
28. Sql translates the relational theory into practice, but imperfectly : True
29. Relation algebra possess the following operators : Select, project, rename
30. Currency data types : currency values; OLE : Picture; Date/ Time : Date / Time; Auto number :
Automatically generates
31. A relational database consists of a collection of Tables
32. The discriminator of a weak entity set of attributes that allow this distinction to be make : True
33. Sql uses a combination of : Relational Algebra, Relational calculus, Logiocal algebra
34. If a record is changed in the form, it will be changed in the table also : True
35. Select ename form employee where lastname like L% will retrieve : All ename beginning with L
36. The purpose of Foreign key is that, data can be related across tables, without having to repeat
data in every table.
37. UML stands for : Unified modeling language
38. Different types of database system users are : application programmers, sophisticated users,
specialized users
39. The domain of an attribute is the set of permitted values
40. Collection of operations that performs a single logical function in a database application is :
Transaction
41. What does cascade specify : views that reference the drop view, constraints in base table, a base
table that reference the drop view
42. In case of joins, the querys select list can select any column from any tables, which may or may
not be in the join : True
43. Select statements are used to retrieve data from : Tables
44. Entities are described in a database by a set of Attribues
45. The insert into statement is used to insert new rows into a table.
DBMS
46. The set difference operators finds tuples in two relations with like attributes which are in the first
relation but not the second.
47. States of transaction are : active, partially committed, failed
48. The default order of orderby clause is : ascending
49. SQL DDL provides commands for : defining relation schemas; deleting relations; modify relation
schemas
50. In generalization, distention is made through attribute inheritance : True
51. Data type can be of the following types : Text, Memo, Number
52. A program Abnormality terminated to similar to rollback
53. to insert data into a relation, we specify a tuple or write a query whose result is the set of tuples to
be inserted : True
54. what will the following sql statement do : create table branch (bname char (20), bcity (char) 30,
assets integer, primary key (bname ) check (assets >=0) : will create branch table, the value of
assets should be create than of equal to 0, will treat bname are primary key
55. triggers can be dropped by drop trigger trigger_name statement
56. an entity is represented by a set of : attributes
57. the facts of representation are : relation Ri is a set of tuples, tuple Rij of a relation particular two of
Ri, relational database schema a set of relations R=1R1; R2-----------Rn
58. formatting a field as per the users requirement can be done by input mask box
59. types of scheduling transactions : serial schedule, serializable schedule, liner schedule
60. Authorisation means : specifying access rights
61. the DDL statements are used by the ; database manager
62. increased notrmalisation sometimes leads to poor performance, so international un-normalised
is used for application like online analytical processing.
63. query processor consists of : ddl interpretor, dml compilor, query evaluation engine
64. what relates to the level of redundancy in a relational database structure : databases
normalization
65. entities in A and B are associated with any number from each other : Many to many
66. because of normalization updating data in one place with instantly change all the places where
that particular data has been used : True
67. other operations in sql are ; rename operation, string operation
68. Create : used to create new tables; drop and delete : used to delete tables; insert and update :
used to insert rows and updates; grant and revoke : used to handle privileges
69. an entity may either be concrete or abstract ; true
70. no help statements can be created for view : False
71. transaction management begins with Begin
72. an entity is an object that exists and is distinguishable from other objects : True
73. transaction query language statements into low level instructions is done by : query processor
74. what is self join : it is a join to table itself; the table appears twice in the FROM clause and is
followed by table allases that qualify column name in the join condition; oracle combines and
returns rows of the table that satisfy the join condition
75. each row in the table corresponds to one entity of the entity set : true
76. a join with a condition containing an equality operator is called : inner join
77. project is denoted by which greek capital letter : PI
78. objects available in MS ACCESS are ; Forms, queries, reports
79. the basic modifications that the database allows the users to use are ; Inserting, Deletion,
updation
80. the maximum length of an object name is 24 characters
81. the view Name will be the name of the view given b y the user.
82. in set union operator : it creates a new relation from all concentrations of two relations; attributes
with the same name in both relations have the same domain; both relations must have the same
number of columns
83. columns name can only be those that are permitted by the sql : true
84. a table can have maximum 300 number of columns
85. tables fields can be modified by selecting the table, the selecting the design view
86. sql is a perfect implementation of relational theory : false
87. which keyword in sql allows updation : update
88. what do you understand by isolate independent multiple relationships : there are multiple
candidate key; this applies primary to key only associative table; appears as ternary relationship
89. is customer is an entity, customer name, address, city, pincode, would be attributes
DBMS
90. embedded sql and dynamic sql define how sql statements can be embedded within general
purpose programming languages : true
91. generalization is the process of forming containment relationship between a higher level entity set
and one or more lower level entity set.
92. a user who has a complete central control of the database is database administrator
93. the internal view is same for all products : true
94. in most cases of matching fields, the primary key is in one table, and the same key will be
represented in the seconds table as : foreign key
95. 1NF : eliminate repeating group; 2NF : eliminate data redundancy; 3NF : eliminate columns not
dependent; BCNF : if there are non trivial
96. other data models are : object oriented data model, network model, hierarchy model
97. sql continues the process of joining table until all tables are joined into the : result
98. sql allows the use of null values to indicate that the value either is unknown or does not exists.
99. example of general purpose programming languages are : C, C++, Java
100.
while creating views, which operational clause is a constraint on updatable views : with
check option
101.
data that has a single value can be stored in a single table
102.
Form view : updating a record, datasheet view : helps in coding; design view : helps in
designing,
103.
in order to apply the relationship, one has to click on : create and save the relationship
104.
sql commands are executed by : semicolon
105.
column names can only be those that are permitted by the sql : true
106.
in orderby if you want the records in descending the keyword to be used is : Desc
107.
relation algebra possesses the following operations : select, project, rename
108.
a database is a collection of data about a specific topic
109.
a domain of possible values should be associated with every attribute : true
110.
if the precedence graph is acyclic then we declare the schedule is : conflict serializable
111.
an entity set is a set of entities of the same type
112.
Which keyword specifies that any dependencies are removed before the drop is
performed in views : cascade
113.
ERD are useful when the meaning of a relationship needs clarifications
114.
selecting the entire record and hitting delete key will : delete a row
115.
the operations performed by relational algebra and functional operations produce a new
relation as a result : true
116.
formal clarifications of formal methods exists for quantifying how normalized a databse is
called : normal forms
117.
the join of two relations R and S denoted RI x IS is only those tuples of R x S that agree
on some list of attributes that is called as : natural joins
118.
all operations performed by relational algebra produce a : relation
119.
the view name will be the name of the view given by the user.
120.
Question
Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer
CURE
Question
What can be used to manage databases data integrity rule
Correct Answer
Integrity constraints , Database triggers
Question
What is called for network of network scatered all over the world
Correct Answer
internet
Question
The SSL protocol developed by microsoft corporation, is an industry accepted
standard for network transport layer security
False
Correct Answer
DBMS
Question
________is visual representation of Entity Relationships.
Correct Answer
ERD
Question
________is protection of database against intentional and unintentional threats that
may be computer-based or non-computer-based
Security
Correct Answer
Question
Correct Answer
Your Answer
Object privileges
One example : Privilege to delete rows from
any named table
One example : Privilege to delete
rows from any named table
Grant command
Contains 'To' clause in syntax
Contains 'To' clause in syntax
Revoke command
Contains 'From' clause in syntax
Contains 'From' clause in syntax
System privileges
can be granted any admin personnel and
application developers
can be granted any admin
personnel and application
developers
Question
Access to a database can be controlled using
Correct Answer
Access Privilages
Question
Correct Answer
Your Answer
Data files
Stores the database itself
Stores the database itself
Person who design and
implement Database
management system modules
Database Management system
designers and implementers
Database Management system
designers and implementers
Person who design and
implement tools
Tool developers
Tool developers
Person responsible for running
and maintenance of Hardware
and Software in a Database
Operators and maintenance
personal
Operators and maintenance
personal
Question
Some clauses of Revoke command are as follows
Correct Answer
FROM , ON
Question
SQL as a language is________of the way it is implemented internally.
Correct Answer
independent
Question
There are two types of views
Correct Answer
updatable views , non updatable views
Question
Some parts of UML are
DBMS
Correct Answer
Class diagram , Use case diagram , activity diagram
Question
Who can grant and revoke the privileges and roles ?
Correct Answer
It depends upon DBMS
Question
Write the command to update privileges on catalog table from all users
Correct Answer
REVOKE UPDATE ON CATALOG FROM PUBLIC
Question
Correct Answer
In 1978 the________approved the SQL database language project which led to the
formulation of the initial SQL standard language
ANSI American national std institute
Question
A revoke command is used to take away a privilege that was granted
Correct Answer
True
Question
>= ' is arithmetic operator.
Correct Answer
False
Question
Correct Answer
UML additionaly provide set of ________that can be invoked to compute values on
the basis of attributes of the object
functions
Question
Enitity name is written in ________in E-R diagram
Correct Answer
upper case
Question
Different syntaxes used for update command in SQL are as follows.
Correct Answer
update
set = , update
set = where
Question
When two entities are associated then the relationship exists is called :
Correct Answer
binary relationship
Question
A user can grant any object privilege on any object he or she owns to any
other user or role
Correct Answer
True
Question
A class diagram is similar to
DBMS
Correct Answer
E-R diagram
Question
Data types CHARACTER AND CHARACTER VARYING are known
collectively as ________
Correct Answer
Character string data types
Question
In data integrity data is not safe from deletion or corruption
Correct Answer
False
True/False
Question
Codd developed E-R model
Correct Answer
False
Select The Blank
Question
Diagrammatic representation in data modeling is ________to represent a
model in diagrammatic notation
Correct Answer
capability
Multiple Choice Single Answer
Question
Write output of following example SELECT LOWER('JOHN') FROM DUAL;
Correct Answer
john
Select The Blank
Question
Database design model helps in improving________
Correct Answer
maintainability
Multiple Choice Multiple Answer
Question
Following date formats used in oracle
Correct Answer
TO_CHAR() , TO_DATE()
Multiple Choice Single Answer
Question
What proides system developers and users with confidence that data will not
be compromised in the internet.
Correct Answer
SSL
Multiple Choice Multiple Answer
Question
Following are properties of roles allowed for easier privilege management
Correct Answer
Reduced privilege administration , Dynamic privilege administration ,
application awareness
Question
________are collection of instructions for manipulating data
DBMS
Correct Answer
program
Question
A________is a situation,event or Personnel that will adversely affect the
database security and the smooth functioning of organization
Correct Answer
Threat
Question
________regulates all user access to named objects through privileges
Correct Answer
Discretionary access control
Question
A fuzzy checkpoint allows transactions to perform updates even while buffer
blocks are being written out.
Correct Answer
True
Question
When an attribute composed of multiple components, each with an
independent existence is called as
Correct Answer
composite attribute
True/False
Question
A database can avoid data inconsistancy
Correct Answer
True
True/False
Question
Temporal constraints can be used to limit the value of a particular attribute to
be in a range
Correct Answer
False
Multiple Choice Multiple Answer
Question
Write the attributes of entity "book"
Correct Answer
book_no , Book_name , Price
Select The Blank
Question
________are installed to eavesdrop on network traffic
Correct Answer
Network sniffers
Select The Blank
Question
________are binary computer representations of stored logical entities
Correct Answer
Data
Multiple Choice Multiple Answer
Question
The different types of database users
DBMS
Correct Answer
Security officers , Database administrators , Network administrators
Your Answer
Security officers , Database administrators , Network administrators
Multiple Choice Multiple Answer
Question
Attributes are classified as
Correct Answer
Simple , Composite , Multivalued
Your Answer
Simple , Composite , Multivalued
Multiple Choice Multiple Answer
Question
Two catagories of privileges are
Correct Answer
System privilege , Object privilege
Your Answer
System privilege , Object privilege
True/False
Question
In data integrity data is not safe from deletion or corruption
Correct Answer
False
Your Answer
False
Match The Following
Question
Correct Answer
Your Answer
long
Used to store arrays of binary
data in ASCII format
Used to store arrays of binary data
in ASCII format
CHAR(SIZE)
To store character strings values To store character strings values of
of fixed length
fixed length
VARCHAR(SIZE)
To stroe variable length
alphanumeric data.
To stroe variable length
alphanumeric data.
date
This data type is used to
represent date and type
This data type is used to represent
date and type
Select The Blank
Question
A ________is permission to access a named object in a prescribed manner
Correct Answer
Previlege
Your Answer
Previlege
Select The Blank
Question
________is a process by which user's identity is checked
Correct Answer
Authentication
DBMS
Your Answer
Authentication
True/False
Question
A revoke command is used to take away a privilege that was granted
Correct Answer
True
Your Answer
True
Question
Which of the following is a database privilege
Correct Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table
Your Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table
Multiple Choice Single Answer
Question
Write command "to grant update authority on price column of catalogue to user
"Smita"
Correct Answer
GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer
GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Multiple Choice Single Answer
Question
Grant the SELECT authority on catalog table to user "Reema" with capability to
grant those privileges to other users on catalog table
Correct Answer
GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer
GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Multiple Choice Single Answer
Question
When the web interface is used , the presentation layer communicated with the
application layer via which protocol?
Correct Answer
HTTP Protocol
Your Answer
TCP/IP Protocol
True/False
Question
Update command is used to delete data values in the table.
Correct Answer
False
Your Answer
False
Select The Blank
Question
________ is one closest to the users
Correct Answer
logical level
Your Answer
logical level
True/False
Question
Correct Answer
A user can grant any object privilege on any object he or she owns to any other
user or role
True
Your Answer
True
Multiple Choice Multiple Answer
DBMS
Question
There are two kinds of tables -
Correct Answer
base tables , views
Your Answer
base tables , views
Select The Blank
Question
A________is collection of tables where table is an unordered collection of rows
Correct Answer
Relational Database
Your Answer
Relational Database
Select The Blank
Question
________is a process by which the user's privileges are ascertained
Correct Answer
Authorisation
Your Answer
Authorisation
Select The Blank
Question
Correct Answer
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Access control
Your Answer
Access control
Multiple Choice Multiple Answer
Question
Security considerations apply to
Correct Answer
data, database , dbms , users and applications
Your Answer
data, database , dbms , users and applications
Multiple Choice Multiple Answer
Question
Drawbacks of shadow paging are :
Correct Answer
Commit overheads , Garbage collection , Data fragmentation
Your Answer
Commit overheads , Garbage collection , Data fragmentation
True/False
Question
You cannot grant or revoke system privileges to users and roles.
Correct Answer
False
Your Answer
False
Multiple Choice Multiple Answer
Question
Two catagories of privileges are
Correct Answer
System privilege , Object privilege
Your Answer
System privilege , Object privilege
Multiple Choice Single Answer
Question
Write a command to select privileges on catalog table from John.
DBMS
Correct Answer
REVOKE SELECT ON CATALOG FROM JOHN
Your Answer
REVOKE SELECT ON CATALOG FROM JOHN
True/False
Question
Database design model help in improving maintainability
Correct Answer
True
Your Answer
True
True/False
Question
A relational model relates records by the value that they contain.
Correct Answer
True
Your Answer
True
Multiple Choice Single Answer
Question
Physical data models used to describe data at what level?
Correct Answer
Lowest level
Your Answer
Lowest level
True/False
Question
Correct Answer
structural constraints are specified to force the placement of information into
structures
True
Your Answer
True
Multiple Choice Single Answer
Question
Write the use of UPDATE command
Correct Answer
To change or to modify data values in table
Your Answer
To change or to modify data values in table
Multiple Choice Single Answer
Question
Which diagram depict the flow of tasks between various components of
system
Correct Answer
Activity diagrams
Your Answer
Activity diagrams
Multiple Choice Multiple Answer
Question
To be able to successfully design and maintain databases we have to do
following
Correct Answer
Identify relationship between objects , Identify worlds data is of interest to us
, Data dictionary
Your Answer
Identify relationship between objects , Identify worlds data is of interest to us
, Data dictionary
Multiple Choice Multiple Answer
Question
The ICAM studies created lot of graphical methods for defining
DBMS
Correct Answer
Functions , Data structures
Your Answer
Functions , Data structures
Select The Blank
Question
Correct Answer
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Access control
Your Answer
Access control
Multiple Choice Single Answer
Question
Write a syntax of SELECT which shows unique records only.
Correct Answer
SELECT DISTINCT * FROM
Your Answer
SELECT DISTINCT * FROM
Multiple Choice Single Answer
Question
Functional dependency is nothing but
Correct Answer
many to one relationship between attributes
Your Answer
many to one relationship between attributes
Multiple Choice Multiple Answer
Question
Strong entities are also called as
Correct Answer
dominant , Parent , owner
Your Answer
dominant , Parent , owner
Select The Blank
Question
The users of the database dont have to worry about ________of the
database
Correct Answer
internal working
Your Answer
internal working
Match The Following
Question
Correct Answer
Your Answer
E-R diagram
Similar to class diagram
Similar to class diagram
Use case
Interaction between users
and system
Interaction between users and
system
Activity diagrams
Flow of tasks between
components
Flow of tasks between
components
DBMS
Implementation diagram
System components and their System components and their
connection
connection
Multiple Choice Single Answer
Question
Degree of relationship indicates no of associated -
Correct Answer
Entities
Your Answer
Entities
True/False
Question
Distinct clause in select command eliminates rows that have exactly
same contents in each column.
Correct Answer
True
Your Answer
True
Select The Blank
Question
________is a process by which user's identity is checked
Correct Answer
Authentication
Your Answer
Authentication
Multiple Choice Multiple Answer
Question
An update log record has the following fields:
Correct Answer
Data item identifier , Old Value , New Value
Your Answer
Data item identifier , Old Value , New Value
Select The Blank
Question
The most widely used conceptual model is________
Correct Answer
E-R model
Your Answer
E-R model
Multiple Choice Single Answer
Question
Which component of query processor, executes low level instructions
generated by DML compiler?
Correct Answer
Query evaluation engine
Your Answer
Query evaluation engine
True/False
Question
Encryption alone is sufficient to secure the data.
Correct Answer
False
DBMS
Your Answer
False
Select The Blank
Question
Entities are represented in ________in E-R diagram
Correct Answer
Rectangular box
Your Answer
Rectangular box
Multiple Choice Multiple Answer
Question
SSL protocol provides
Correct Answer
authorisation , data encryption , data integrity
Your Answer
authorisation , data encryption , data integrity
True/False
Question
Active database system provide active rules, that can automatically
initiate actions, when certain events occur.
Correct Answer
True
Your Answer
True
Select The Blank
Question
Data types BIT and BIT VARYING are known as ________
Correct Answer
Bit string data types
Your Answer
Bit string data types
Multiple Choice Single Answer
Question
Write a command to remove update authority on price and year
columns of the catalog tablse from user "Alexis"
Correct Answer
REVOKE UPDATE(PRICE,YEAR) ON CATALOG FROM ALEXIS
Your Answer
REVOKE UPDATE(PRICE,YEAR) ON CATALOG FROM ALEXIS
Select The Blank
Question
Correct Answer
________is the process by which the user's access to physical
data in the application is limited, based on his privileges.
Access control
Your Answer
Access control
Multiple Choice Multiple Answer
Question
Which of the following is a criterion that should be satisfied by
an optimal data model
Correct Answer
Structural validity , Express ability , shareability
Your Answer
Structural validity , shareability
DBMS
True/False
Question
Correct Answer
You cannot grant or revoke system privileges to users and
roles.
False
Your Answer
False
True/False
Question
Log contains partial record of all database activity.
Correct Answer
False
Your Answer
False
Match The Following
Question
Correct Answer
Your Answer
DBA
Data base administrator
Data base administrator
UML
Unified modeling language
Unified modeling language
DBMS
Data base management
system
Data base management
system
RDBMS
Relational DBMS
Relational DBMS
Multiple Choice Single Answer
Question
What operation is used to protect data from corruption and
deletion .
Correct Answer
Data integrity
Your Answer
Select The Blank
Question
Data privacy
Correct Answer
________are binary computer representations of stored logical
entities
Data
Your Answer
Data
Multiple Choice Multiple Answer
Question
Database Management System Provides the facilities of
Correct Answer
Security , Atomicity
Your Answer
Concurrent access anomalies , Security , Atomicity
Select The Blank
Question
Enitity name is written in ________in E-R diagram
Correct Answer
upper case
Your Answer
upper case
Multiple Choice Multiple Answer
Question
SSL protocol provides
DBMS
Correct Answer
authorisation , data encryption , data integrity
Your Answer
data encryption , security
Select The Blank
Question
Correct Answer
The information collected in requirement analysis stage is
________for information modeling
input
Your Answer
input
Multiple Choice Single Answer
Question
Ternary relationship exists when there are how many number of
entities ?
Correct Answer
three
Your Answer
three
Select The Blank
Question
Entities are represented in ________in E-R diagram
Correct Answer
Rectangular box
Your Answer
Rectangular box
Select The Blank
Question
Correct Answer
________published the paper "Relational Model of Data for
Large Shared Data Banks "
F.Codd
Your Answer
F.Codd
Select The Blank
Question
Correct Answer
UML additionaly provide set of ________that can be invoked to
compute values on the basis of attributes of the object
functions
Your Answer
functions
Multiple Choice Multiple Answer
Question
Specify any 2 forms of insert command
Correct Answer
Your Answer
INSERT INTO SELECT , FROM , INSERT INTO SELECT ,
FROM WHERE
INSERT INTO SELECT , FROM , INSERT INTO SELECT ,
FROM WHERE
Select The Blank
Question
________are collection of instructions for manipulating data
Correct Answer
program
Your Answer
program
True/False
Question
You cannot grant or revoke system privileges to users and
roles.
DBMS
Correct Answer
False
Your Answer
False
Multiple Choice Single Answer
Question
Write a command to grant all privileges on BOOK TABLE to
user "Mathews"
Correct Answer
GRANT ALL ON BOOK TO MATHEWS
Your Answer
GRANT ALL ON BOOK TO MATHEWS
Multiple Choice Multiple Answer
Question
What are secured using authorisation and access control.
Correct Answer
The intranet , local clients , opearators
Your Answer
The intranet , local clients , opearators
Select The Blank
Question
Correct Answer
A________is collection of tables where table is an unordered
collection of rows
Relational Database
Your Answer
Database
True/False
Question
Correct Answer
Physical data independence is the capacity to change external
schema without having to change conceptual schema.
False
Your Answer
False
Multiple Choice Single Answer
Question
UML shows entity sets as
Correct Answer
Boxes
Your Answer
Rectangles
Question
Correct Answer
Write a function which returns number of rows in the tables
including duplicates
count(*)
Your Answer
count(*)
Match The Following
Question
Correct Answer
Your Answer
Authorisation
permission given to user
permission given to user
Previlege
Permission for accessing
objects
Permission for accessing
objects
Role
Provide authority
Provide authority
Integrity
hallmark of data security
hallmark of data security
DBMS
Select The Blank
Question
Correct Answer
________provides a graphical means of modeling various
components of software system
UML
Your Answer
ERD
Select The Blank
Question
In________there is no security of data
Correct Answer
DBMS
Your Answer
DML
Multiple Choice Multiple Answer
Question
Which of the following are functions of DBA
Correct Answer
Installing and upgrading the dbms , Enrolling users and
maintaining security , contacting dbms vendor for technical
support
Your Answer
Installing and upgrading the dbms , Enrolling users and
maintaining security , contacting dbms vendor for technical
support
Multiple Choice Multiple Answer
Question
Following are properties of roles allowed for easier privilege
management
Correct Answer
Reduced privilege administration , Dynamic privilege
administration , application awareness
Your Answer
Reduced privilege administration , Dynamic privilege
administration
Multiple Choice Multiple Answer
Question
Three levels of database service
Correct Answer
External level , Conceptual level , Physical level
Your Answer
External level , Physical level , Internal level
Multiple Choice Single Answer
Question
Number of operations take place to convert raw data into
information. What these no of operations called as
Correct Answer
Data processing
Your Answer
Data processing
Multiple Choice Multiple Answer
Question
The functions of Database adminstrator are
Correct Answer
Your Answer
True/False
Question
Correct Answer
Authorization for data access , Schema definition , Maintenance
of Database
Authorization for data access , Schema definition , Maintenance
of Database
The determination of information requirements for an application
doesnot play a crucial role in the selection of an actual database
structural data model.
False
DBMS
Your Answer
False
Select The Blank
Question
________is a process by which user's identity is checked
Correct Answer
Authentication
Your Answer
Authorisation
True/False
Question
Correct Answer
The shadow page table is never changed over the duration of
the transaction
True
Your Answer
True
Multiple Choice Single Answer
Question
Which of the following term means the ability to represent a
model using esily understood diagrammatic notation
Correct Answer
Diagrammatic representation
Your Answer
True/False
Question
Expressability
Correct Answer
A user can grant any object privilege on any object he or she
owns to any other user or role
True
Your Answer
True
True/False
Question
Correct Answer
If company policy does not support more than 100 employees in
a department . So Dept-Emp relationship is "one to many
relationship"
True
Your Answer
True
Select The Blank
Question
________is a process by which user's identity is checked
Correct Answer
Authentication
Your Answer
Authentication
Select The Blank
Question
Correct Answer
A________ mechanism that can be used to provide
authorization
role
Your Answer
Role
Multiple Choice Multiple Answer
Question
The different types of database users
Correct Answer
Security officers , Database administrators , Network
administrators
DBMS
Your Answer
Database administrators , Database operators
Multiple Choice Single Answer
Question
The controls or limits in database system is called as
Correct Answer
Constraints
Your Answer
Constraints
Multiple Choice Multiple Answer
Question
The different types of database users
Correct Answer
Security officers , Database administrators , Network
administrators
Database administrators , Database operators
Your Answer
Multiple Choice Single Answer
Question
Write simple syntax of insert command
Correct Answer
insert into
(,) values(,)
Your Answer
insert into
(,) values(,)
Multiple Choice Single Answer
Question
A database must be prtotected against
Correct Answer viruses
Your Answer
modification
True/False
Question
Security is important issue in database management .
Correct Answer True
Your Answer
True