Você está na página 1de 20

DBMS

1. Each Value in a field represents multiple data types: False


2. Relational algebra is : An algebraic language, The operators operate on relations, queries are
expressed without applying special operators to relations
3. SQL can : Define the structure, modify data, specify security constraints
4. A Report is an effective way to print data in a printed form.
5. An entity that does not possess sufficient attributes to form a primary key is called : Weak entity
set
6. The notations for representing the types of operations which can be performed on relational
databases is called as : Relational Algebra
7. Standard attributes are attributes of a relation Ri that are not keys : True
8. Example of constraints are : Primary Key, Foreign key, check constraints
9. A not null constraints make it mandatory for the user to Enter some value
10. The 3NF will not be in BCNF if : There are multiple candidate key, the keys are composed of
multiple attributes, there are common attributes between keys
11. The union operation returns the union of which two relations : Compatible
12. Key words associated with MS-Access are : Database, Table, Fields
13. Who has introduced the relational model : Dr E.F Codd
14. Codd suggested that database should save single value and multiple value data in the same table
: True
15. In normalization updates can be quickly performed with adequate risk of data becoming
inconsistent : False
16. Every transaction is a unit of both : Atomicity and consistency
17. Double click on design view display columns like : Field name, data type, description
18. Select clause : Corresponds to selection; From clause : It lists the relations to be scanned; where
clause : used to list the attributes desired; exits : uses subquery as a condition
19. Sql provides a mechanism for renaming both relations and attributes, this can be done by rename
operation
20. A view is effectively a sql query stored in the Catalog
21. Which statement is used to modify the data in the table : update
22. A simple drop down to a line will help in : adding a row
23. What is equijoin : it is also called as innerjoin, it is join with a condition containing an equality
operator, it combines rows that have equivalent value for the specified columns
24. In natural join duplicates are removed as in all relation operators : True
25. Data types are different catagories within a table
26. A transaction is recorded in a log : True
27. A trigger has to be : implement
28. Sql translates the relational theory into practice, but imperfectly : True
29. Relation algebra possess the following operators : Select, project, rename
30. Currency data types : currency values; OLE : Picture; Date/ Time : Date / Time; Auto number :
Automatically generates
31. A relational database consists of a collection of Tables
32. The discriminator of a weak entity set of attributes that allow this distinction to be make : True
33. Sql uses a combination of : Relational Algebra, Relational calculus, Logiocal algebra
34. If a record is changed in the form, it will be changed in the table also : True
35. Select ename form employee where lastname like L% will retrieve : All ename beginning with L
36. The purpose of Foreign key is that, data can be related across tables, without having to repeat
data in every table.
37. UML stands for : Unified modeling language
38. Different types of database system users are : application programmers, sophisticated users,
specialized users
39. The domain of an attribute is the set of permitted values
40. Collection of operations that performs a single logical function in a database application is :
Transaction
41. What does cascade specify : views that reference the drop view, constraints in base table, a base
table that reference the drop view
42. In case of joins, the querys select list can select any column from any tables, which may or may
not be in the join : True
43. Select statements are used to retrieve data from : Tables
44. Entities are described in a database by a set of Attribues
45. The insert into statement is used to insert new rows into a table.

DBMS
46. The set difference operators finds tuples in two relations with like attributes which are in the first
relation but not the second.
47. States of transaction are : active, partially committed, failed
48. The default order of orderby clause is : ascending
49. SQL DDL provides commands for : defining relation schemas; deleting relations; modify relation
schemas
50. In generalization, distention is made through attribute inheritance : True
51. Data type can be of the following types : Text, Memo, Number
52. A program Abnormality terminated to similar to rollback
53. to insert data into a relation, we specify a tuple or write a query whose result is the set of tuples to
be inserted : True
54. what will the following sql statement do : create table branch (bname char (20), bcity (char) 30,
assets integer, primary key (bname ) check (assets >=0) : will create branch table, the value of
assets should be create than of equal to 0, will treat bname are primary key
55. triggers can be dropped by drop trigger trigger_name statement
56. an entity is represented by a set of : attributes
57. the facts of representation are : relation Ri is a set of tuples, tuple Rij of a relation particular two of
Ri, relational database schema a set of relations R=1R1; R2-----------Rn
58. formatting a field as per the users requirement can be done by input mask box
59. types of scheduling transactions : serial schedule, serializable schedule, liner schedule
60. Authorisation means : specifying access rights
61. the DDL statements are used by the ; database manager
62. increased notrmalisation sometimes leads to poor performance, so international un-normalised
is used for application like online analytical processing.
63. query processor consists of : ddl interpretor, dml compilor, query evaluation engine
64. what relates to the level of redundancy in a relational database structure : databases
normalization
65. entities in A and B are associated with any number from each other : Many to many
66. because of normalization updating data in one place with instantly change all the places where
that particular data has been used : True
67. other operations in sql are ; rename operation, string operation
68. Create : used to create new tables; drop and delete : used to delete tables; insert and update :
used to insert rows and updates; grant and revoke : used to handle privileges
69. an entity may either be concrete or abstract ; true
70. no help statements can be created for view : False
71. transaction management begins with Begin
72. an entity is an object that exists and is distinguishable from other objects : True
73. transaction query language statements into low level instructions is done by : query processor
74. what is self join : it is a join to table itself; the table appears twice in the FROM clause and is
followed by table allases that qualify column name in the join condition; oracle combines and
returns rows of the table that satisfy the join condition
75. each row in the table corresponds to one entity of the entity set : true
76. a join with a condition containing an equality operator is called : inner join
77. project is denoted by which greek capital letter : PI
78. objects available in MS ACCESS are ; Forms, queries, reports
79. the basic modifications that the database allows the users to use are ; Inserting, Deletion,
updation
80. the maximum length of an object name is 24 characters
81. the view Name will be the name of the view given b y the user.
82. in set union operator : it creates a new relation from all concentrations of two relations; attributes
with the same name in both relations have the same domain; both relations must have the same
number of columns
83. columns name can only be those that are permitted by the sql : true
84. a table can have maximum 300 number of columns
85. tables fields can be modified by selecting the table, the selecting the design view
86. sql is a perfect implementation of relational theory : false
87. which keyword in sql allows updation : update
88. what do you understand by isolate independent multiple relationships : there are multiple
candidate key; this applies primary to key only associative table; appears as ternary relationship
89. is customer is an entity, customer name, address, city, pincode, would be attributes

DBMS
90. embedded sql and dynamic sql define how sql statements can be embedded within general
purpose programming languages : true
91. generalization is the process of forming containment relationship between a higher level entity set
and one or more lower level entity set.
92. a user who has a complete central control of the database is database administrator
93. the internal view is same for all products : true
94. in most cases of matching fields, the primary key is in one table, and the same key will be
represented in the seconds table as : foreign key
95. 1NF : eliminate repeating group; 2NF : eliminate data redundancy; 3NF : eliminate columns not
dependent; BCNF : if there are non trivial
96. other data models are : object oriented data model, network model, hierarchy model
97. sql continues the process of joining table until all tables are joined into the : result
98. sql allows the use of null values to indicate that the value either is unknown or does not exists.
99. example of general purpose programming languages are : C, C++, Java
100.
while creating views, which operational clause is a constraint on updatable views : with
check option
101.
data that has a single value can be stored in a single table
102.
Form view : updating a record, datasheet view : helps in coding; design view : helps in
designing,
103.
in order to apply the relationship, one has to click on : create and save the relationship
104.
sql commands are executed by : semicolon
105.
column names can only be those that are permitted by the sql : true
106.
in orderby if you want the records in descending the keyword to be used is : Desc
107.
relation algebra possesses the following operations : select, project, rename
108.
a database is a collection of data about a specific topic
109.
a domain of possible values should be associated with every attribute : true
110.
if the precedence graph is acyclic then we declare the schedule is : conflict serializable
111.
an entity set is a set of entities of the same type
112.
Which keyword specifies that any dependencies are removed before the drop is
performed in views : cascade
113.
ERD are useful when the meaning of a relationship needs clarifications
114.
selecting the entire record and hitting delete key will : delete a row
115.
the operations performed by relational algebra and functional operations produce a new
relation as a result : true
116.
formal clarifications of formal methods exists for quantifying how normalized a databse is
called : normal forms
117.
the join of two relations R and S denoted RI x IS is only those tuples of R x S that agree
on some list of attributes that is called as : natural joins
118.
all operations performed by relational algebra produce a : relation
119.
the view name will be the name of the view given by the user.
120.
Question
Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer

CURE

Question

What can be used to manage databases data integrity rule

Correct Answer

Integrity constraints , Database triggers

Question

What is called for network of network scatered all over the world

Correct Answer

internet

Question

The SSL protocol developed by microsoft corporation, is an industry accepted


standard for network transport layer security
False

Correct Answer

DBMS
Question

________is visual representation of Entity Relationships.

Correct Answer

ERD

Question

________is protection of database against intentional and unintentional threats that


may be computer-based or non-computer-based
Security

Correct Answer

Question

Correct Answer

Your Answer

Object privileges

One example : Privilege to delete rows from


any named table

One example : Privilege to delete


rows from any named table

Grant command

Contains 'To' clause in syntax

Contains 'To' clause in syntax

Revoke command

Contains 'From' clause in syntax

Contains 'From' clause in syntax

System privileges

can be granted any admin personnel and


application developers

can be granted any admin


personnel and application
developers

Question

Access to a database can be controlled using

Correct Answer

Access Privilages

Question

Correct Answer

Your Answer

Data files

Stores the database itself

Stores the database itself

Person who design and


implement Database
management system modules

Database Management system


designers and implementers

Database Management system


designers and implementers

Person who design and


implement tools

Tool developers

Tool developers

Person responsible for running


and maintenance of Hardware
and Software in a Database

Operators and maintenance


personal

Operators and maintenance


personal

Question

Some clauses of Revoke command are as follows

Correct Answer

FROM , ON

Question

SQL as a language is________of the way it is implemented internally.

Correct Answer

independent

Question

There are two types of views

Correct Answer

updatable views , non updatable views

Question

Some parts of UML are

DBMS
Correct Answer

Class diagram , Use case diagram , activity diagram

Question

Who can grant and revoke the privileges and roles ?

Correct Answer

It depends upon DBMS

Question

Write the command to update privileges on catalog table from all users

Correct Answer

REVOKE UPDATE ON CATALOG FROM PUBLIC

Question
Correct Answer

In 1978 the________approved the SQL database language project which led to the
formulation of the initial SQL standard language
ANSI American national std institute

Question

A revoke command is used to take away a privilege that was granted

Correct Answer

True

Question

>= ' is arithmetic operator.

Correct Answer

False

Question
Correct Answer

UML additionaly provide set of ________that can be invoked to compute values on


the basis of attributes of the object
functions

Question

Enitity name is written in ________in E-R diagram

Correct Answer

upper case

Question

Different syntaxes used for update command in SQL are as follows.

Correct Answer
update
set = , update
set = where
Question

When two entities are associated then the relationship exists is called :

Correct Answer

binary relationship

Question

A user can grant any object privilege on any object he or she owns to any
other user or role

Correct Answer

True

Question

A class diagram is similar to

DBMS
Correct Answer

E-R diagram

Question

Data types CHARACTER AND CHARACTER VARYING are known


collectively as ________

Correct Answer

Character string data types

Question

In data integrity data is not safe from deletion or corruption

Correct Answer

False

True/False
Question

Codd developed E-R model

Correct Answer

False

Select The Blank


Question

Diagrammatic representation in data modeling is ________to represent a


model in diagrammatic notation

Correct Answer

capability

Multiple Choice Single Answer


Question

Write output of following example SELECT LOWER('JOHN') FROM DUAL;

Correct Answer

john

Select The Blank


Question

Database design model helps in improving________

Correct Answer

maintainability

Multiple Choice Multiple Answer


Question

Following date formats used in oracle

Correct Answer

TO_CHAR() , TO_DATE()

Multiple Choice Single Answer


Question

What proides system developers and users with confidence that data will not
be compromised in the internet.

Correct Answer

SSL

Multiple Choice Multiple Answer


Question

Following are properties of roles allowed for easier privilege management

Correct Answer

Reduced privilege administration , Dynamic privilege administration ,


application awareness

Question

________are collection of instructions for manipulating data

DBMS
Correct Answer

program

Question

A________is a situation,event or Personnel that will adversely affect the


database security and the smooth functioning of organization

Correct Answer

Threat

Question

________regulates all user access to named objects through privileges

Correct Answer

Discretionary access control

Question

A fuzzy checkpoint allows transactions to perform updates even while buffer


blocks are being written out.

Correct Answer

True

Question

When an attribute composed of multiple components, each with an


independent existence is called as

Correct Answer

composite attribute

True/False
Question

A database can avoid data inconsistancy

Correct Answer

True

True/False
Question

Temporal constraints can be used to limit the value of a particular attribute to


be in a range

Correct Answer

False

Multiple Choice Multiple Answer


Question

Write the attributes of entity "book"

Correct Answer

book_no , Book_name , Price

Select The Blank


Question

________are installed to eavesdrop on network traffic

Correct Answer

Network sniffers

Select The Blank


Question

________are binary computer representations of stored logical entities

Correct Answer

Data

Multiple Choice Multiple Answer


Question

The different types of database users

DBMS
Correct Answer

Security officers , Database administrators , Network administrators

Your Answer

Security officers , Database administrators , Network administrators

Multiple Choice Multiple Answer


Question

Attributes are classified as

Correct Answer

Simple , Composite , Multivalued

Your Answer

Simple , Composite , Multivalued

Multiple Choice Multiple Answer


Question

Two catagories of privileges are

Correct Answer

System privilege , Object privilege

Your Answer

System privilege , Object privilege

True/False
Question

In data integrity data is not safe from deletion or corruption

Correct Answer

False

Your Answer

False

Match The Following


Question

Correct Answer

Your Answer

long

Used to store arrays of binary


data in ASCII format

Used to store arrays of binary data


in ASCII format

CHAR(SIZE)

To store character strings values To store character strings values of


of fixed length
fixed length

VARCHAR(SIZE)

To stroe variable length


alphanumeric data.

To stroe variable length


alphanumeric data.

date

This data type is used to


represent date and type

This data type is used to represent


date and type

Select The Blank


Question

A ________is permission to access a named object in a prescribed manner

Correct Answer

Previlege

Your Answer

Previlege

Select The Blank


Question

________is a process by which user's identity is checked

Correct Answer

Authentication

DBMS
Your Answer

Authentication

True/False
Question

A revoke command is used to take away a privilege that was granted

Correct Answer

True

Your Answer

True

Question

Which of the following is a database privilege

Correct Answer

The right to connect the database , The right to create table , The right to select
rows from another user's table
Your Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table
Multiple Choice Single Answer
Question
Write command "to grant update authority on price column of catalogue to user
"Smita"
Correct Answer
GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer

GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA

Multiple Choice Single Answer


Question
Grant the SELECT authority on catalog table to user "Reema" with capability to
grant those privileges to other users on catalog table
Correct Answer
GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer

GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION

Multiple Choice Single Answer


Question
When the web interface is used , the presentation layer communicated with the
application layer via which protocol?
Correct Answer
HTTP Protocol
Your Answer

TCP/IP Protocol

True/False
Question

Update command is used to delete data values in the table.

Correct Answer

False

Your Answer

False

Select The Blank


Question

________ is one closest to the users

Correct Answer

logical level

Your Answer

logical level

True/False
Question
Correct Answer

A user can grant any object privilege on any object he or she owns to any other
user or role
True

Your Answer

True

Multiple Choice Multiple Answer

DBMS
Question

There are two kinds of tables -

Correct Answer

base tables , views

Your Answer

base tables , views

Select The Blank


Question

A________is collection of tables where table is an unordered collection of rows

Correct Answer

Relational Database

Your Answer

Relational Database

Select The Blank


Question

________is a process by which the user's privileges are ascertained

Correct Answer

Authorisation

Your Answer

Authorisation

Select The Blank


Question
Correct Answer

________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Access control

Your Answer

Access control

Multiple Choice Multiple Answer


Question
Security considerations apply to

Correct Answer

data, database , dbms , users and applications

Your Answer

data, database , dbms , users and applications

Multiple Choice Multiple Answer


Question
Drawbacks of shadow paging are :
Correct Answer

Commit overheads , Garbage collection , Data fragmentation

Your Answer

Commit overheads , Garbage collection , Data fragmentation

True/False
Question

You cannot grant or revoke system privileges to users and roles.

Correct Answer

False

Your Answer

False

Multiple Choice Multiple Answer


Question
Two catagories of privileges are
Correct Answer

System privilege , Object privilege

Your Answer

System privilege , Object privilege

Multiple Choice Single Answer


Question
Write a command to select privileges on catalog table from John.

DBMS
Correct Answer

REVOKE SELECT ON CATALOG FROM JOHN

Your Answer

REVOKE SELECT ON CATALOG FROM JOHN

True/False
Question

Database design model help in improving maintainability

Correct Answer

True

Your Answer

True

True/False
Question

A relational model relates records by the value that they contain.

Correct Answer

True

Your Answer

True

Multiple Choice Single Answer


Question
Physical data models used to describe data at what level?
Correct Answer

Lowest level

Your Answer

Lowest level

True/False
Question
Correct Answer

structural constraints are specified to force the placement of information into


structures
True

Your Answer

True

Multiple Choice Single Answer


Question
Write the use of UPDATE command
Correct Answer

To change or to modify data values in table

Your Answer

To change or to modify data values in table

Multiple Choice Single Answer


Question
Which diagram depict the flow of tasks between various components of
system
Correct Answer
Activity diagrams
Your Answer

Activity diagrams

Multiple Choice Multiple Answer


Question
To be able to successfully design and maintain databases we have to do
following
Correct Answer
Identify relationship between objects , Identify worlds data is of interest to us
, Data dictionary
Your Answer
Identify relationship between objects , Identify worlds data is of interest to us
, Data dictionary
Multiple Choice Multiple Answer
Question
The ICAM studies created lot of graphical methods for defining

DBMS
Correct Answer

Functions , Data structures

Your Answer

Functions , Data structures

Select The Blank


Question
Correct Answer

________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Access control

Your Answer

Access control

Multiple Choice Single Answer


Question

Write a syntax of SELECT which shows unique records only.

Correct Answer

SELECT DISTINCT * FROM

Your Answer

SELECT DISTINCT * FROM

Multiple Choice Single Answer


Question

Functional dependency is nothing but

Correct Answer

many to one relationship between attributes

Your Answer

many to one relationship between attributes

Multiple Choice Multiple Answer


Question

Strong entities are also called as

Correct Answer

dominant , Parent , owner

Your Answer

dominant , Parent , owner

Select The Blank


Question

The users of the database dont have to worry about ________of the
database

Correct Answer

internal working

Your Answer

internal working

Match The Following


Question

Correct Answer

Your Answer

E-R diagram

Similar to class diagram

Similar to class diagram

Use case

Interaction between users


and system

Interaction between users and


system

Activity diagrams

Flow of tasks between


components

Flow of tasks between


components

DBMS
Implementation diagram

System components and their System components and their


connection
connection

Multiple Choice Single Answer


Question

Degree of relationship indicates no of associated -

Correct Answer

Entities

Your Answer

Entities

True/False
Question

Distinct clause in select command eliminates rows that have exactly


same contents in each column.

Correct Answer

True

Your Answer

True

Select The Blank


Question

________is a process by which user's identity is checked

Correct Answer

Authentication

Your Answer

Authentication

Multiple Choice Multiple Answer


Question

An update log record has the following fields:

Correct Answer

Data item identifier , Old Value , New Value

Your Answer

Data item identifier , Old Value , New Value

Select The Blank


Question

The most widely used conceptual model is________

Correct Answer

E-R model

Your Answer

E-R model

Multiple Choice Single Answer


Question

Which component of query processor, executes low level instructions


generated by DML compiler?

Correct Answer

Query evaluation engine

Your Answer

Query evaluation engine

True/False
Question

Encryption alone is sufficient to secure the data.

Correct Answer

False

DBMS
Your Answer

False

Select The Blank


Question

Entities are represented in ________in E-R diagram

Correct Answer

Rectangular box

Your Answer

Rectangular box

Multiple Choice Multiple Answer


Question

SSL protocol provides

Correct Answer

authorisation , data encryption , data integrity

Your Answer

authorisation , data encryption , data integrity

True/False
Question

Active database system provide active rules, that can automatically


initiate actions, when certain events occur.

Correct Answer

True

Your Answer

True

Select The Blank


Question

Data types BIT and BIT VARYING are known as ________

Correct Answer

Bit string data types

Your Answer

Bit string data types

Multiple Choice Single Answer


Question

Write a command to remove update authority on price and year


columns of the catalog tablse from user "Alexis"

Correct Answer

REVOKE UPDATE(PRICE,YEAR) ON CATALOG FROM ALEXIS

Your Answer

REVOKE UPDATE(PRICE,YEAR) ON CATALOG FROM ALEXIS

Select The Blank


Question
Correct Answer

________is the process by which the user's access to physical


data in the application is limited, based on his privileges.
Access control

Your Answer

Access control

Multiple Choice Multiple Answer


Question
Which of the following is a criterion that should be satisfied by
an optimal data model
Correct Answer
Structural validity , Express ability , shareability
Your Answer

Structural validity , shareability

DBMS
True/False
Question
Correct Answer

You cannot grant or revoke system privileges to users and


roles.
False

Your Answer

False

True/False
Question

Log contains partial record of all database activity.

Correct Answer

False

Your Answer

False

Match The Following


Question

Correct Answer

Your Answer

DBA

Data base administrator

Data base administrator

UML

Unified modeling language

Unified modeling language

DBMS

Data base management


system

Data base management


system

RDBMS

Relational DBMS

Relational DBMS

Multiple Choice Single Answer


Question
What operation is used to protect data from corruption and
deletion .
Correct Answer
Data integrity
Your Answer
Select The Blank
Question

Data privacy

Correct Answer

________are binary computer representations of stored logical


entities
Data

Your Answer

Data

Multiple Choice Multiple Answer


Question
Database Management System Provides the facilities of
Correct Answer

Security , Atomicity

Your Answer

Concurrent access anomalies , Security , Atomicity

Select The Blank


Question

Enitity name is written in ________in E-R diagram

Correct Answer

upper case

Your Answer

upper case

Multiple Choice Multiple Answer


Question
SSL protocol provides

DBMS
Correct Answer

authorisation , data encryption , data integrity

Your Answer

data encryption , security

Select The Blank


Question
Correct Answer

The information collected in requirement analysis stage is


________for information modeling
input

Your Answer

input

Multiple Choice Single Answer


Question
Ternary relationship exists when there are how many number of
entities ?
Correct Answer
three
Your Answer

three

Select The Blank


Question

Entities are represented in ________in E-R diagram

Correct Answer

Rectangular box

Your Answer

Rectangular box

Select The Blank


Question
Correct Answer

________published the paper "Relational Model of Data for


Large Shared Data Banks "
F.Codd

Your Answer

F.Codd

Select The Blank


Question
Correct Answer

UML additionaly provide set of ________that can be invoked to


compute values on the basis of attributes of the object
functions

Your Answer

functions

Multiple Choice Multiple Answer


Question
Specify any 2 forms of insert command
Correct Answer
Your Answer

INSERT INTO SELECT , FROM , INSERT INTO SELECT ,


FROM WHERE
INSERT INTO SELECT , FROM , INSERT INTO SELECT ,
FROM WHERE

Select The Blank


Question

________are collection of instructions for manipulating data

Correct Answer

program

Your Answer

program

True/False
Question

You cannot grant or revoke system privileges to users and


roles.

DBMS
Correct Answer

False

Your Answer

False

Multiple Choice Single Answer


Question
Write a command to grant all privileges on BOOK TABLE to
user "Mathews"
Correct Answer
GRANT ALL ON BOOK TO MATHEWS
Your Answer

GRANT ALL ON BOOK TO MATHEWS

Multiple Choice Multiple Answer


Question
What are secured using authorisation and access control.
Correct Answer

The intranet , local clients , opearators

Your Answer

The intranet , local clients , opearators

Select The Blank


Question
Correct Answer

A________is collection of tables where table is an unordered


collection of rows
Relational Database

Your Answer

Database

True/False
Question
Correct Answer

Physical data independence is the capacity to change external


schema without having to change conceptual schema.
False

Your Answer

False

Multiple Choice Single Answer


Question
UML shows entity sets as
Correct Answer

Boxes

Your Answer

Rectangles

Question
Correct Answer

Write a function which returns number of rows in the tables


including duplicates
count(*)

Your Answer

count(*)

Match The Following


Question

Correct Answer

Your Answer

Authorisation

permission given to user

permission given to user

Previlege

Permission for accessing


objects

Permission for accessing


objects

Role

Provide authority

Provide authority

Integrity

hallmark of data security

hallmark of data security

DBMS
Select The Blank
Question
Correct Answer

________provides a graphical means of modeling various


components of software system
UML

Your Answer

ERD

Select The Blank


Question

In________there is no security of data

Correct Answer

DBMS

Your Answer

DML

Multiple Choice Multiple Answer


Question
Which of the following are functions of DBA
Correct Answer

Installing and upgrading the dbms , Enrolling users and


maintaining security , contacting dbms vendor for technical
support
Your Answer
Installing and upgrading the dbms , Enrolling users and
maintaining security , contacting dbms vendor for technical
support
Multiple Choice Multiple Answer
Question
Following are properties of roles allowed for easier privilege
management
Correct Answer
Reduced privilege administration , Dynamic privilege
administration , application awareness
Your Answer
Reduced privilege administration , Dynamic privilege
administration
Multiple Choice Multiple Answer
Question
Three levels of database service
Correct Answer

External level , Conceptual level , Physical level

Your Answer

External level , Physical level , Internal level

Multiple Choice Single Answer


Question
Number of operations take place to convert raw data into
information. What these no of operations called as
Correct Answer
Data processing
Your Answer

Data processing

Multiple Choice Multiple Answer


Question
The functions of Database adminstrator are
Correct Answer
Your Answer
True/False
Question

Correct Answer

Authorization for data access , Schema definition , Maintenance


of Database
Authorization for data access , Schema definition , Maintenance
of Database
The determination of information requirements for an application
doesnot play a crucial role in the selection of an actual database
structural data model.
False

DBMS
Your Answer

False

Select The Blank


Question

________is a process by which user's identity is checked

Correct Answer

Authentication

Your Answer

Authorisation

True/False
Question
Correct Answer

The shadow page table is never changed over the duration of


the transaction
True

Your Answer

True

Multiple Choice Single Answer


Question
Which of the following term means the ability to represent a
model using esily understood diagrammatic notation
Correct Answer
Diagrammatic representation
Your Answer
True/False
Question

Expressability

Correct Answer

A user can grant any object privilege on any object he or she


owns to any other user or role
True

Your Answer

True

True/False
Question

Correct Answer

If company policy does not support more than 100 employees in


a department . So Dept-Emp relationship is "one to many
relationship"
True

Your Answer

True

Select The Blank


Question

________is a process by which user's identity is checked

Correct Answer

Authentication

Your Answer

Authentication

Select The Blank


Question
Correct Answer

A________ mechanism that can be used to provide


authorization
role

Your Answer

Role

Multiple Choice Multiple Answer


Question
The different types of database users
Correct Answer

Security officers , Database administrators , Network


administrators

DBMS
Your Answer

Database administrators , Database operators

Multiple Choice Single Answer


Question
The controls or limits in database system is called as
Correct Answer

Constraints

Your Answer

Constraints

Multiple Choice Multiple Answer


Question
The different types of database users
Correct Answer

Security officers , Database administrators , Network


administrators
Database administrators , Database operators

Your Answer

Multiple Choice Single Answer


Question
Write simple syntax of insert command
Correct Answer
insert into

(,) values(,)
Your Answer
insert into

(,) values(,)
Multiple Choice Single Answer
Question
A database must be prtotected against
Correct Answer viruses
Your Answer

modification

True/False
Question

Security is important issue in database management .

Correct Answer True


Your Answer

True

Você também pode gostar