WEB DEVELOPMENT AND DATABASE ADMINISTRATION
HOLISTIC EXAM WORKSHEET
1. Which one of the following is a display device unit that acts as an interface between the user and the
computer system?
A. Printer C. Monitor
B. Scanner D. Mouse
2. Which document defines the what, when, and who questions of system development including all
activities to be performed, the individuals or resources who will perform the activities and the time
required completing each activity?
A. Project milestone C. Critical success factors
B. Requirements D. Project plan
3. Which one of the following is correct about JavaScript?
A. It is a database C. It is a server side scripting language
B. It is a client side scripting language D. It is software
4. All of the following are key elements which can be used to implement a Comprehensive Disaster Recovery
Program EXCEPT:
A. Recovery Procedures C. Back-up procedures
B. Implementation Procedures D. Non- critical Application Assessment
5. Which one describes and explains anything to do with your software product, ranging from internal
documentation for teams to external documentation written for end users?
A. User documentation C. Development methods
B. Security tester D. Technical documentation
6. Which one of the following is a correct syntax to call an external JavaScript file in the current HTML
document?
A. <import src=”jsfile.js”></import> C. <script src=”jsfile.js”></script>
B. <script link=”jsfile.js”></script> D. <script href=”jsfile.js”></script>
7. In the three tier architecture, the intermediate layer between database an client server is classified as:
A. Transaction server C. Disk server
B. Application server D. Functional server
8. It is a field(collection of fields) in one table, that refers to the PRIMARY KEY in another table which
ensures a relationship is created:
A. Metadata C. Referential Integrity
B. Primary key D. Foreign key
9. Suppose the database consists of multiple transactions that are used to manage organizations group of
related data. So which database attribute best describes the characteristics of a transaction that it shouldn’t
be divided or split rather it can exist as a single unit is:
A. Consistency C. Atomicity
B. Isolation D. Durability
10. From the 5s procedures, which one is used to remove unnecessary items from each area?
A. Sort C. Standardize
B. Sustain D. Shine
11. Which step records client support requirements based on organizational rules, regulations, and policies?
A. Client C. Log
B. Escalate D. Priority
12. The most important roles of a system analyst in business is:
A. Technical understanding of information system
B. Knowing what data needs to be stored and used
C. Problem solving
D. Special programming skills
13. A network device used to connect two or more dissimilar network is:
A. Switch C. Router
B. Hub D. Gateway
14. Which one of the following technique can be used for optimizing backed-up data space?
A. Authentication and Deduplication C. Deduplication only
B. Compression and Deduplication D. Encryption and Deduplication
15. Which one of the following is the correct syntax to make the background-color of all paragraph elements
to be yellow?
A. all {background-color: yellow;} C. all {background-color:#yellow;}
B. P {background-color:#yellow;} D. p{background-color: yellow;}
16. Among the following, which one is the cheapest type of hosting?
A. VPS web hosting services
B. Shared web-hosting services
C. Dedicated web hosting services
D. Free web hosting services
17. What will the output of the following CSS code snippet?
span {
border:1px solid red;
outline : green dotted
thick;
}
A. All span elements will have a green thick border and a red outline
B. All span elements will have an outer red border and inner green dotted border
C. All span elements will have a red border and a green dotted outline
D. All span elements will have an outer green dotted border and an inner red border
18. _________ is used to anticipate, react to, and recover from events that threaten the security of
information and information assets in the organization.
A. Manning plan C. Contingency plan
B. Quality assurance plan D. Action plan
19. A small piece of data sent from a website and stored in user’s web browser while a user is browsing a
website is:
A. Web cookie C. Web cache
B. Web firewall D. Web client
20. A UNION query is which one of the following?
A. Combines the output from no more than two queries and must include the same number of
columns.
B. Combines the output from multiple queries and does not include the same number of columns.
C. Combines the output from multiple queries and must include the same number of columns.
D. Combines the output from no more than two queries and does not include the same number of
columns.
21. When deadlock is detected, the recovery is normally accomplished by:
A. Rollback of transaction C. Transaction lock
B. Consistency checking D. Locking of data
22. You are looking for a website hosting service to host you online shopping website. What are the criteria
that will put first when you compare a hosting company?
A. Security features C. Email availability
B. Uptime D. Customer Service
23. You have table in your database having a foreign key. What type of command do you use to add new
column to the table?
A. On Update Cascade C. On Update Set Default
B. On Update Restrict D. On Update No Action
24. The collection of documents that are designed to help people who need to manage, operate or maintain
computer hardware or software is:
A. Inventory documents C. Hardware Inventory
B. Inventory record D. Technical documentation
25. In which HTML element, we put the JavaScript code?
A. <javascript>…….</javascript> C. <javascript>…….</javascript>
B. <CSS>………</CSS> D. <script>------</script>
26. Which Microsoft office package enables users to perform mathematical computation and visualization of
data?
A. Microsoft Excel C. Microsoft PowerPoint
B. Microsoft Publisher D. Microsoft Word
27. The first step in developing a plan is ____________
A. Putting the plan into action
B. Prioritization of problems
C. Situational analysis
D. Setting the organizational objectives
28. Which features of OOP describes the reusability of codes?
A. Encapsulation C. Abstraction
B. Inheritance D. Polymorphism
29. One of the following critical resources needs to be consider in system infrastructure design plan for any
system development:
A. Procedure C. Network and Hardware resources
B. Time requirement D. Performance of user
30. Among the following, which one is used for communication between the web server and the database
server?
A. Native support
B. Common Gateway Interface (CGI) script
C. Middleware
D. Java Database Connectivity (JDBC)
31. Assume that you are asked to design the logical view of the database for ABC PLC. As a database expert
which one clearly shows the skeleton structure that defines how the data is organized and how the
relationships are associated?
A. Database Manipulation C. Database Retrieval
B. Database Schema D. Database Architecture
32. Which process involves in developing an approximation of the cost of resources needed to complete a
project?
A. Finalizing the cost baseline C. Controlling costs
B. Estimating costs D. Determining the budget
33. Which one of the following is the feature of the database?
A. Lack of authentication C. User interface provided
B. Store data in multiple locations D. No backup for the data stored
34. Commercial Bank of Ethiopia would like to distribute to all branches about business applications across
multiple locations and computer systems, reserving the data center for web server, database, and
telecommunications function. This is example of:
A. Technology Architecture Planning C. Applications Architecture Planning
B. Enterprise Resource Planning (ERP) D. Strategic Planning
35. Which two features of OOP are the same?
A. Encapsulation and Polymorphism C. Encapsulation and Abstraction
B. Inheritance and Encapsulation D. Abstraction and Polymorphism
36. The process finding the defect and suggesting improvements about the system quality is:
A. Prevent and Recovery C. Quality Planning
B. Total Quality Management D. Process Management
37. From computer maintenance procedures which one is the process of recognizing the data stored on the
hard drive so that related pieces of data are put back together, all lined up in a continuous fashion:
A. Defragmenter C. Antivirus
B. Disk formatter D. Memory Partitioning
38. Mr.’s Alemu was ICT technician for ABC PLC. He is responsible for interpreting system requests and
specifications, site preparation and user training, and contact point for customers. This skill is:
A. Team management C. Leadership
B. Customer relations D. Conflict Management
39. You are a database developer for an insurance company. One and only one product manager manage every
insurance policy. One product manager can manage many policies. How can you represent that
information in the database?
A. Create another entity, which contains policy ID and the manager ID
B. Include the manager ID in the Policies entity
C. Include the manager ID in the policies entity and the policy ID in the manager’s entity
D. Include the policy ID in the Managers entity
40. The horizontal bar chart that depicts project task against the calendar:
A. Manning C. Budget breaks down
B. Functional break down D. Schedule
41. The last step of the analyst’s approach to problem solving is:
A. Decide which solution is best, and make a recommendation
B. Verify that the benefits of solving the problem outweigh the costs
C. Monitor to make sure that you obtain the desired results
D. Implement the solution
42. Which one of the following is included in web and database need strategy?
A. Evaluate current financial requirement C. Business benefit
B. Evaluate the impact of changes D. People involvement
43. Database regression test can be done:
A. Sometimes C. Regular basis
B. Occasionally D. Not required
44. Among the following which refers to describing the data description, representing data semantics, and
describing the consistency constraints that apply to the data?
A. Modifying data C. Modeling data
B. Refining data D. Adding data
45. Part of normal work and that does not require a special event to occur and alien with a sequence of events
or project is:
A. Continuous Improvement C. Organizational Knowledge
B. Relevant Metrics D. Breakthrough Improvement
46. What is the correct HTML code for create a hyperlink?
A. <a>https://w.w.w.gkseries.com</a>
B. <a href=”https://w.w.w.gkseries.com”>Gkseries.com</a>
C. <a name=”https://w.w.w.gkseries.com”>Gkseries.com</a>
D. <a url=”https://w.w.w.gkseries.com>Gkseries.com</a>
47. It is a video transmission interface that offers better resolution than the others and supports up to
8K()7680X4320) resolution at 60HZ with an increased bandwidth of 77.37Gbps.
A. DVI Port C. HDMI Port
B. VGA Port D. Display Port
48. A copy of the database is called_______
A. Sandbox C. Instance
B. Alias D. Mailbox
49. Suppose you are recruited as a Database Administrator in FullBright PLC where records of exchange
commodities are expected to be managed centrally for the sake of administration using SQL. Thus, which
of the following syntax is the correct implementation of SQL commands used to build a table PRODUCTS
and add fields such as ProdID, ProdName, ItemQuantity, ProdUnitPrice and Description for the table?
A. Insert table products (ProdID, ProdName, ItemQuantity, ProdUnitPrice, Description);
B. Select *from ProdID, ProdName, ItemQuantity ,ProdUnitPrice, Description;
C. update products set ProdID, ProdName, ItemQuantity, ProdUnitPrice, Description; WHERE
ProdID=’ETH30’;
D. Create table products (ProdID, ProdName, ItemQuantity, ProdUnitPrice, Description);
50. The systems development life cycle is:
A. A structured approach for developing information systems.
B. A set of guidelines that an end users follows when developing their own business applications
C. The analysis and assessment tasks that need to be completed when designing and developing
information systems
D. A method for testing new IT applications.
51. What is a Functional Requirement?
A. Specifies the tasks the program should not complete
B. Specifies the tasks the system must complete
C. Defines system attributes such as security, reliability, performance, maintainability, scalability and
usability
D. Specifies the system’s operation capabilities, constraints, and attempt to improve its functionality
52. A person or organization that has an interest in system or is impacted by the system is:
A. Network Admin C. System Analyst
B. Stakeholder D. Database Admin
53. A security mechanism used in data communication environment to filter he packets forwarded to and from
the network is referred to as:
A. Encryption C. Biological Biometrics
B. Cryptography D. Firewall
54. Solution developers, business clients working together or number of third party solution developers
working together are:
A. Clients C. Manager
B. Supporters and Vendors D. Project Team
55. Which type of data cannot be stored in the database?
A. Texts, files containing data C. Image oriented data
B. JSON D. Data in the form of audio or video
56. Connecting website to backend servers, processing the data and controlling the behaviors of the higher
layers are done by:
A. Server side PHP scripts C. Java scripts
B. CSS scripts D. HTML Language
57. Which of the following is true?
A. Data recovery from optical devices is faster than tape
B. Tape library is not an example of near line storage
C. Data recovery can take hours for offline backup
D. Data can be recovered slower in online backup
58. Which one of the following CSS selector is used to specify a group of elements?
A. tag C. id
B. class D. collector
59. To bring solution to prevent database system crash in your company, what action you are going to take?
A. Escalate the issue
B. Document the issue and the solution that has implemented
C. Test the solution in the similar organization
D. Gather more information about the issues
60. Which one of the following given statements possibly contains the error?
A. Select empid from emp where empid=10006;
B. Select empid from emp;
C. Select *from emp where empid=10003;
D. Select empid where empid=1009 and Lasstname=’GELLER’;
61. Which one of the following is the correct syntax to link an external style sheet in the HTML file?
A. <link rel=”stylesheeet” src=”style.css”>
B. < style rel=”style sheet” link=”style.css”/>
C. style rel=”style sheet” src=”style.css”/>
D. <link rel=”style sheet” href=”style.css”/>
62. Which one of the following refers to the division of a system into processes or subsystems?
A. Programming C. Data Management
B. Functional decomposition D. System design
63. Which one of the following is an integrated part of database that can restore the database to the consistent
state of before failure?
A. Transaction scheme C. Backup scheme
B. Restoring scheme D. Recovery scheme
64. Which of the following is generally used for performing tasks like creating the structure of the relation
and deleting the relation?
A. DML (Data Manipulation Language)
B. DDL (Data Definition Language)
C. Relational schema
D. Query
65. Media recovery reefers to recovering database
A. After a system crash
B. After deadlock
C. After database has been physically damaged
D. After some individual transaction has failed
66. A database user who maintains a database management system and necessarily responsible for looking
after its overall usage and apply limitations to maintain isolation enforce security is:
A. Database Architects C. Database Administrators
B. Database Designers D. End Users
67. Over a period of time, a system failure may result in a program crash and /or loss of data. As an IT expert,
you are called to restore system files and to restart the system. Which of the following best describes this?
A. Technical support C. Program Maintenance
B. System enhancement D. System recovery
68. The first official activity of the project team as it initiates the project planning phase is to:
A. Write a project proposal C. Define the business problem
B. Develop a cost/benefit analysis D. Staff the project team
69. Microsoft Windows, IOS, and UNIX/LINUX are all types of software that belongs to_____.
A. Application software C. Database system
B. Operating system D. Hardware system
70. Data schemas represent the skeleton structure of a database and it represents the ____view of the database
as a whole.
A. Practical view C. Semantic view
B. Logical view D. Analytical view
71. DHTML, HTML, and XML are an example of:
A. Markup language
B. Web Browsers
C. Word processor
D. Data structure
72. The most common risk management strategy in web based system is:
A. Avoidance C. Mitigation
B. Acceptance D. Transference
73. Unnecessary convenience of products, from one location to another or handoff from one employee to
another is:
A. Over production waste C. Waiting time waste
B. Transport waste D. Processing waste
74. Which SQL operator is used as a conjunction that connects the two queries to return only the required set
of data?
A. FROM Clause C. AND
B. LIKE D. UPDATE
75. A database key word that indicates the constrain of a database whose column values of a table are required
to be assign an initial values in the database is usually:
A. VALUES C. DISTNICT
B. WHERE Clause D. NOT NULL
76. A technique that seeks to alter the nature of the work done in a business function with the objective of
radically improving performance is called_____
A. Information Systems Strategic Planning C. Strategic Planning
B. Business Process Reengineering D. Enterprise Resource Planning
77. Which of the following is not common in conducting an applied research regarding the improvement of
an ICT infrastructure in an organization?
A. Acknowledge others to communicate with you verbally and non-verbally
B. Organizational needs and selection criteria are taken for granted
C. Reporting your findings to an appropriate person
D. Maintain a positive attitude for your research area
78. Mr. Alemu is a database manager at XYZ Company. He is required to plan and organize the overall works
done in his respective responsibility. Then, which task is going to be executed at last by Mr. Alemu?
A. Reviewing and evaluating work plans and activities as per the set plan
B. Implementation of the work plan outlined
C. Setting the organizational objectives
D. Escalation of problems
79. One of the following task is highly important while you are setting organizations objectives when you
plan and organize works?
A. Setting objectives which are difficult to measure as per the standards
B. Identifications of objectives which are not attainable
C. Developing objectives which are inconsistent with organizational aims
D. Enhancing the motivations and commitment of the group members
80. What is an abstraction in Object-oriented programming?
A. Showing the important data
B. Hiding the implementation
C. Hiding the important data
D. Hiding the implementation and showing only the features
81. Which one of the following is typed correctly?
A. </p> Write your first paragraph</p>
B. <h1> Write your first CSS Example<h1>
C. <imgsrc=”images/nature-3.jpg” style=”width:300px”>
D. <td>Sonoo<td
82. If a database has to be maintained using OOP, to store the details of each employee in a company, which
would be the best choice among the following?
A. Define a separate variable for each detail
B. Define a generic type to store string and number details
C. Define a structure to store details of each employee
D. Define a class to store details of each employee
83. Which of the following used in the application programs to request data from the database management
system?
A. Data definition language
B. Transaction control language
C. Data control language
D. Data manipulation language
84. Which of the following are not characteristics of database-driven web sites?
A. Data Availability C. Data Security
B. Data Accuracy D. Data Integrity
85. Below the following, one is a process of analyzing the data objects and their relationship to the other
objects.
A. Storage Modeling C. Web Modeling
B. System Modeling D. Data Modeling
86. Which operator can be used to free the memory allocated for an object in C++?
A. Unallocated C. Delete
B. Free () D. Collect
87. A criterion for a web to select a web hosting that measures of how much of the month or week or year
your website is available is accessible:
A. Security features C. Uptime
B. Email availability D. Customer Service
88. Which of the following statement is false about hosting?
A. Through more expensive than shared hosting, dedicated hosting is more secure.
B. Dedicated hosting is safer than shared hosting
C. Shared hosting is cheaper than dedicated hosting
D. Shared hosting is safer than dedicated hosting
89. The service provider for the user described in which section?
A. User requirements C. System requirements
B. System model D. Appendices
90. To make your website mobile friendly and to adapt it to different screen platform, you must make your
website_______
A. Reactive C. Responsive
B. Fast Loading D. Light
91. The type of diagram which specifies operations on objects is considered as__________
A. Entity diagram C. Class diagram
B. Attribute diagram D. Functional diagram
92. Which deadlock is detected, the recovery is normally accomplished by____
A. Locking of data C. Consistency checking
B. Rollback of transaction D. Transaction lock
93. Which one of the following is not an essential features of when you plan for data conversion from a
legacy system?
A. Completeness C. Timelines
B. Accuracy D. User interface
94. By normalizing relations or sets of relations, in a database we can minimize_______
A. Databases C. Data
B. Redundancy D. Fields
95. Which one is a Data Manipulation command?
A. TURNICATE C. SELECT
B. DROP D. DELETE
96. Backward recovery is which of the following?
A. Where the after-images are applied to the database
B. Where the before-images are applied to the database
C. Where the after-images and before-images are applied to the database
D. Switching to an existing copy of the database
97. Performance analysis and tuning is which of the following?
A. Undertaken one time at the time of a DBMS installation
B. Undertaken as an ongoing part of the backup of a database
C. Undertaken as an ongoing part of managing a database
D. Undertaken one time at the time of the implementation of a new application
98. You have run SQL statement that asked the DBMS to display data from a table named USER_TABLES.
The result include columns of data labeled “Table name”, “Number of columns” and “primary key”. You
are looking:
A. Report data C. User data
B. Meta data D. Indexes data
99. The number of blocks transferred from the disk, along with the number of disks seeks, are used to estimate
the cost of a query evaluation plan.
A. Query Implementation plan C. Query Evaluation plan
B. Query Exemption plan D. Query Estimation plan
100. What does the <br> tag adds to your webpage?
A. Paragraph break C. Section break
B. Long break D. Line break
101. Which type of CSS is used in the below code? <p style=”border:2px solid red;”>
A. Internal CSS C. External CSS
B. Inline CSS D. Outside CSS
102. Connecting website to backend servers, processing the data and controlling the behavior of the higher
layers are done by?
A. HTML language C. Server-side PHP scripts
B. Java scripts D. CSS scripts
103. Which one of the following SQL command helps to add a record in to a row using SQL in a database?
A. INSERT C. CREATE
B. ADD D. MAKE
104. Which SQL operator is used as a conjunction that connects the two queries to return only the required
sets of data?
A. UPDATE C. FROM Clause
B. LIKE D. AND
105. Which operator is used to compare a value to a specified list of values?
A. BETWEEN C. WHERE
B. ANY D. IN
106. Which one is a step in system development that lays out the functional and non-functional requirements?
A. Software version C. Web development
B. Database development D. Software requirement specifications
107. Which one is a collection of similar types of entities?
A. Relational set C. Attribute set
B. Entity set D. ER set
108. __________ is the data that has been organized or presented in a meaning full way?
A. Storage C. Information
B. Software D. Application
109. The SQL statement that queries or reads data from a table is returns a result set of records, from one or
more tables.
A. QUERY C. ORDER
B. SELECT D. READ
110. It is clear that nowadays most organizations are developing database systems over their file management
systems that they are using before. So, why do you think that operations prefer database management
systems over file management methods?
A. File management supports more files than Database Management Systems
B. Database management provides rigorous security than File management
C. File management provides complex backup/recover than Database systems
D. Database management has simple structure to implement than file management