Escolar Documentos
Profissional Documentos
Cultura Documentos
DBMS
46. The set difference operators finds tuples in two relations with like attributes which are in the first
relation but not the second.
47. States of transaction are : active, partially committed, failed
48. The default order of orderby clause is : ascending
49. SQL DDL provides commands for : defining relation schemas; deleting relations; modify relation
schemas
50. In generalization, distention is made through attribute inheritance : True
51. Data type can be of the following types : Text, Memo, Number
52. A program Abnormality terminated to similar to rollback
53. to insert data into a relation, we specify a tuple or write a query whose result is the set of tuples to
be inserted : True
54. what will the following sql statement do : create table branch (bname char (20), bcity (char) 30,
assets integer, primary key (bname ) check (assets >=0) : will create branch table, the value of
assets should be create than of equal to 0, will treat bname are primary key
55. triggers can be dropped by drop trigger trigger_name statement
56. an entity is represented by a set of : attributes
57. the facts of representation are : relation Ri is a set of tuples, tuple Rij of a relation particular two of
Ri, relational database schema a set of relations R=1R1; R2-----------Rn
58. formatting a field as per the users requirement can be done by input mask box
59. types of scheduling transactions : serial schedule, serializable schedule, liner schedule
60. Authorisation means : specifying access rights
61. the DDL statements are used by the ; database manager
62. increased notrmalisation sometimes leads to poor performance, so international un-normalised
is used for application like online analytical processing.
63. query processor consists of : ddl interpretor, dml compilor, query evaluation engine
64. what relates to the level of redundancy in a relational database structure : databases
normalization
65. entities in A and B are associated with any number from each other : Many to many
66. because of normalization updating data in one place with instantly change all the places where
that particular data has been used : True
67. other operations in sql are ; rename operation, string operation
68. Create : used to create new tables; drop and delete : used to delete tables; insert and update :
used to insert rows and updates; grant and revoke : used to handle privileges
69. an entity may either be concrete or abstract ; true
70. no help statements can be created for view : False
71. transaction management begins with Begin
72. an entity is an object that exists and is distinguishable from other objects : True
73. transaction query language statements into low level instructions is done by : query processor
74. what is self join : it is a join to table itself; the table appears twice in the FROM clause and is
followed by table allases that qualify column name in the join condition; oracle combines and
returns rows of the table that satisfy the join condition
75. each row in the table corresponds to one entity of the entity set : true
76. a join with a condition containing an equality operator is called : inner join
77. project is denoted by which greek capital letter : PI
78. objects available in MS ACCESS are ; Forms, queries, reports
79. the basic modifications that the database allows the users to use are ; Inserting, Deletion,
updation
80. the maximum length of an object name is 24 characters
81. the view Name will be the name of the view given b y the user.
82. in set union operator : it creates a new relation from all concentrations of two relations; attributes
with the same name in both relations have the same domain; both relations must have the same
number of columns
83. columns name can only be those that are permitted by the sql : true
84. a table can have maximum 300 number of columns
85. tables fields can be modified by selecting the table, the selecting the design view
86. sql is a perfect implementation of relational theory : false
87. which keyword in sql allows updation : update
88. what do you understand by isolate independent multiple relationships : there are multiple
candidate key; this applies primary to key only associative table; appears as ternary relationship
89. is customer is an entity, customer name, address, city, pincode, would be attributes
DBMS
90. embedded sql and dynamic sql define how sql statements can be embedded within general
purpose programming languages : true
91. generalization is the process of forming containment relationship between a higher level entity set
and one or more lower level entity set.
92. a user who has a complete central control of the database is database administrator
93. the internal view is same for all products : true
94. in most cases of matching fields, the primary key is in one table, and the same key will be
represented in the seconds table as : foreign key
95. 1NF : eliminate repeating group; 2NF : eliminate data redundancy; 3NF : eliminate columns not
dependent; BCNF : if there are non trivial
96. other data models are : object oriented data model, network model, hierarchy model
97. sql continues the process of joining table until all tables are joined into the : result
98. sql allows the use of null values to indicate that the value either is unknown or does not exists.
99. example of general purpose programming languages are : C, C++, Java
100.
while creating views, which operational clause is a constraint on updatable views : with
check option
101.
data that has a single value can be stored in a single table
102.
Form view : updating a record, datasheet view : helps in coding; design view : helps in
designing,
103.
in order to apply the relationship, one has to click on : create and save the relationship
104.
sql commands are executed by : semicolon
105.
column names can only be those that are permitted by the sql : true
106.
in orderby if you want the records in descending the keyword to be used is : Desc
107.
relation algebra possesses the following operations : select, project, rename
108.
a database is a collection of data about a specific topic
109.
a domain of possible values should be associated with every attribute : true
110.
if the precedence graph is acyclic then we declare the schedule is : conflict serializable
111.
an entity set is a set of entities of the same type
112.
Which keyword specifies that any dependencies are removed before the drop is
performed in views : cascade
113.
ERD are useful when the meaning of a relationship needs clarifications
114.
selecting the entire record and hitting delete key will : delete a row
115.
the operations performed by relational algebra and functional operations produce a new
relation as a result : true
116.
formal clarifications of formal methods exists for quantifying how normalized a databse is
called : normal forms
117.
the join of two relations R and S denoted RI x IS is only those tuples of R x S that agree
on some list of attributes that is called as : natural joins
118.
all operations performed by relational algebra produce a : relation
119.
the view name will be the name of the view given by the user.
120.
Question
Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL
Correct Answer
CURE
Question
Correct Answer
Question
What is called for network of network scatered all over the world
Correct Answer
internet
Question
Correct Answer
DBMS
Question
Correct Answer
ERD
Question
Correct Answer
Question
Correct Answer
Your Answer
Object privileges
Grant command
Revoke command
System privileges
Question
Correct Answer
Access Privilages
Question
Correct Answer
Your Answer
Data files
Tool developers
Tool developers
Question
Correct Answer
FROM , ON
Question
Correct Answer
independent
Question
Correct Answer
Question
DBMS
Correct Answer
Question
Correct Answer
Question
Write the command to update privileges on catalog table from all users
Correct Answer
Question
Correct Answer
In 1978 the________approved the SQL database language project which led to the
formulation of the initial SQL standard language
ANSI American national std institute
Question
Correct Answer
True
Question
Correct Answer
False
Question
Correct Answer
Question
Correct Answer
upper case
Question
Correct Answer
update
set = , update
set = where
Question
When two entities are associated then the relationship exists is called :
Correct Answer
binary relationship
Question
A user can grant any object privilege on any object he or she owns to any
other user or role
Correct Answer
True
Question
DBMS
Correct Answer
E-R diagram
Question
Correct Answer
Question
Correct Answer
False
True/False
Question
Correct Answer
False
Correct Answer
capability
Correct Answer
john
Correct Answer
maintainability
Correct Answer
TO_CHAR() , TO_DATE()
What proides system developers and users with confidence that data will not
be compromised in the internet.
Correct Answer
SSL
Correct Answer
Question
DBMS
Correct Answer
program
Question
Correct Answer
Threat
Question
Correct Answer
Question
Correct Answer
True
Question
Correct Answer
composite attribute
True/False
Question
Correct Answer
True
True/False
Question
Correct Answer
False
Correct Answer
Correct Answer
Network sniffers
Correct Answer
Data
DBMS
Correct Answer
Your Answer
Correct Answer
Your Answer
Correct Answer
Your Answer
True/False
Question
Correct Answer
False
Your Answer
False
Correct Answer
Your Answer
long
CHAR(SIZE)
VARCHAR(SIZE)
date
Correct Answer
Previlege
Your Answer
Previlege
Correct Answer
Authentication
DBMS
Your Answer
Authentication
True/False
Question
Correct Answer
True
Your Answer
True
Question
Correct Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table
Your Answer
The right to connect the database , The right to create table , The right to select
rows from another user's table
Multiple Choice Single Answer
Question
Write command "to grant update authority on price column of catalogue to user
"Smita"
Correct Answer
GRANT UPDATE(PRICE) ON CATALOGUE TO SMITA
Your Answer
TCP/IP Protocol
True/False
Question
Correct Answer
False
Your Answer
False
Correct Answer
logical level
Your Answer
logical level
True/False
Question
Correct Answer
A user can grant any object privilege on any object he or she owns to any other
user or role
True
Your Answer
True
DBMS
Question
Correct Answer
Your Answer
Correct Answer
Relational Database
Your Answer
Relational Database
Correct Answer
Authorisation
Your Answer
Authorisation
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Access control
Your Answer
Access control
Correct Answer
Your Answer
Your Answer
True/False
Question
Correct Answer
False
Your Answer
False
Your Answer
DBMS
Correct Answer
Your Answer
True/False
Question
Correct Answer
True
Your Answer
True
True/False
Question
Correct Answer
True
Your Answer
True
Lowest level
Your Answer
Lowest level
True/False
Question
Correct Answer
Your Answer
True
Your Answer
Activity diagrams
DBMS
Correct Answer
Your Answer
________is the process by which the user's access to physical data in the
application is limited, based on his privileges.
Access control
Your Answer
Access control
Correct Answer
Your Answer
Correct Answer
Your Answer
Correct Answer
Your Answer
The users of the database dont have to worry about ________of the
database
Correct Answer
internal working
Your Answer
internal working
Correct Answer
Your Answer
E-R diagram
Use case
Activity diagrams
DBMS
Implementation diagram
Correct Answer
Entities
Your Answer
Entities
True/False
Question
Correct Answer
True
Your Answer
True
Correct Answer
Authentication
Your Answer
Authentication
Correct Answer
Your Answer
Correct Answer
E-R model
Your Answer
E-R model
Correct Answer
Your Answer
True/False
Question
Correct Answer
False
DBMS
Your Answer
False
Correct Answer
Rectangular box
Your Answer
Rectangular box
Correct Answer
Your Answer
True/False
Question
Correct Answer
True
Your Answer
True
Correct Answer
Your Answer
Correct Answer
Your Answer
Your Answer
Access control
DBMS
True/False
Question
Correct Answer
Your Answer
False
True/False
Question
Correct Answer
False
Your Answer
False
Correct Answer
Your Answer
DBA
UML
DBMS
RDBMS
Relational DBMS
Relational DBMS
Data privacy
Correct Answer
Your Answer
Data
Security , Atomicity
Your Answer
Correct Answer
upper case
Your Answer
upper case
DBMS
Correct Answer
Your Answer
Your Answer
input
three
Correct Answer
Rectangular box
Your Answer
Rectangular box
Your Answer
F.Codd
Your Answer
functions
Correct Answer
program
Your Answer
program
True/False
Question
DBMS
Correct Answer
False
Your Answer
False
Your Answer
Your Answer
Database
True/False
Question
Correct Answer
Your Answer
False
Boxes
Your Answer
Rectangles
Question
Correct Answer
Your Answer
count(*)
Correct Answer
Your Answer
Authorisation
Previlege
Role
Provide authority
Provide authority
Integrity
DBMS
Select The Blank
Question
Correct Answer
Your Answer
ERD
Correct Answer
DBMS
Your Answer
DML
Your Answer
Data processing
Correct Answer
DBMS
Your Answer
False
Correct Answer
Authentication
Your Answer
Authorisation
True/False
Question
Correct Answer
Your Answer
True
Expressability
Correct Answer
Your Answer
True
True/False
Question
Correct Answer
Your Answer
True
Correct Answer
Authentication
Your Answer
Authentication
Your Answer
Role
DBMS
Your Answer
Constraints
Your Answer
Constraints
Your Answer
(,) values(,)
Your Answer
insert into
(,) values(,)
Multiple Choice Single Answer
Question
A database must be prtotected against
Correct Answer viruses
Your Answer
modification
True/False
Question
True