SD8 1. 2. 3. 4. 5. 6. 7. Which of the following is a database service level? (a) External (b) Physical (c) Conceptual (d) All of the above Which of the following is not a criterion that should be considered when doing requirements analysis? (a) Need (b) Correctness (c) Consistency (d) Speed DML stands for _________________. (a) Data Mining Language (b) Dependency Maintenance Link (c) Data Manipulation Language (d) None of the above Which of the following is an attribute that represents a value that is derivable from the value of a related attribute or set of attributes, not necessarily in the same entity? (a) Single-valued (b) Multi-valued (c) Atomic (d) Derived What is a relationship called when an association is maintained between two entities/ (a) Unary (b) Binary (c) Ternary (d) Quaternary _______ expresses the specific number of entity occurrences associated with one occurrence of the related entity. (a) Connectivity (b) Degree (c) Cardinality (d) None of the above Which of the following is a valid SQL data type? (a) CHARACTER (b) NUMERIC (c) FLOAT (d) All of the above XIX 8. 9. 10. 11. 12. 13. 14. Which of the following is a comparison operator? (a) = (b) LIKE (c) BETWEEN (d) All of the above Which of the following is not a comparison operator? (a) ANY (b) ALL (c) SOME (d) UNION In which of the following cases will the RDBMS specify a default value for the column if there are no values for it? (a) NOT NULL WITH DEFAULT (b) COLUMN DEFAULT (c) NOT NULL UNIQUE (d) None of the above Which of the following clause specifies the table or tables from where the data has to be retrieved/ (a) TABLE (b) FROM (c) WHERE (d) None of the above Which of the following keyword is used to eliminate duplicate rows from the query result? (a) NO DUPLICATE (b) UNIQUE (c) DISTINCT (d) None of the above Which of the following computing model is used by distributed database systems? (a) Mainframe computing model (b) Disconnected personal computing model (c) Client/server computing model (d) None of the above Which of the following refers to the fact that the command used to perform a task independent of the location of the data and location of the system where the command was issued? (a) Naming Transparency (b) Location Transparency (c) Fragmentation Transparency (d) All of the above (1) SD8 15. What is data about data called? (a) Metadata (b) Data catalog (c) Information (d) None of the above 16. Metadata means ___ (a) Data about data. (b) Data in records (c) Scattered data (d) None of the above 17. Populating a database means ___ (a) Loading data into the database. (b) Crosschecking the database (c) Modifying the data in the database. (d) None of the above 18. Atomicity means ___ (a) A transaction is either in full or null. (b) A commited transaction. (c) Dual transction (d) None of the above 19. Database systems are designed to ___ (a) Manage large bodies of information (b) To bundle data at one place. (c) To operate on scattered data (d) None of the above 20. Security of data means ____ (a) Not every user of database system should be able to access all the data. (b) System can be accessible to all users. (c) System should block users. (d) None of the above 21. What defines a view or views of the database for particular users? (a) Internal schema (b) External schema (c) Conceptual schema (d) None of the above. 22. Which of the following is a characteristic of data in a database? (a) Shared (b) Redundant (c) Independent (d) All of the above 23. Which of the following is a hierarchial database? (a) IDMS (b) IMS (c) DB2 (d) Oracle XIX 24. ER model is an example of (a) Object based logical model. (b) Record based logical model. (c) Physical model. (d) None of the above 25. To the computer, a file is nothing more than __________ (a) Text (b) Image (c) Information (d) Series of bytes 26. The values of the attributes describe a particular _____________ (a) Entity (b) File (c) Instance (d) None of the above 27. An ______ of the entity is represented by a set of specific values for each of the attributes. (a) Manifestation (b) Occurrence (c) Instance (d) None of the above 28. Which of the following stores data that is permanent in nature? (a) Master (b) Transaction (c) Report (d) None of the above 29. Which of the following is the critical factor that enables managers and organizations to gain a competitive edge in world that focuses on achievement and advantage? (a) More Manpower (b) More Capacity (c) Quality Information (d) None of the above 30. Student ID, employee ID, part number, etc. are examples of: (a) Fields (b) Primary keys (c) Unique record identifiers (d) All of the above 31. During direct file processing, if the index is in record key sequence, then which is the most efficient procedure for locating a key? (a) Linear Search (b) Sequential Search (c) Binary Search (d) None of the above (2) SD8 32. When data are frequently added to or deleted from a file, the file is said to have a high _________ (a) Relevancy (b) Quality (c) Accuracy (d) Volatility 33. Data ________ refers to the timeliness of data. (a) Integrity (b) Redundancy (c) Currency (d) None of the above 34. Which of the following is the formal process for deciding which attributes should be grouped together in a relation? (a) Normalization (b) Performance tuning (c) Optimization (d) None of the above 35. Who developed the BCNF? (a) Boyd and Cromwell (b) Date and Codd (c) Date and White (d) Boyce and Codd 36. Which of the following is a formal process of developing data structures in a manner that eliminates redundancy and promotes integrity? (a) Normalization (b) Compilation (c) Performance tuning (d) Information modeling 37. Which of the following is a valid relationship between related entities or tables? (a) One-to-one relationship (b) One-to-many relationship (c) Many-to-many relationship (d) All of the above 38. Which of the following is used to express a many-to-many relationship? (a) Union tables (b) Join tables (c) Intersection tables (d) None of the above XIX 39. What are two or more relationship among tables that are related closely enough so that they can be resolved into a single relationship? (a) Complex relationships (b) Complex multiple relationships (c) Semantically related multiple relationships (d) None of the above 40. Like SELECT statement the update statements operate on ___________ (a) Table (b) Columns (c) Both (a) and (b) (d) None of the above 41. Which of the following is the host language? (a) COBOL (b) Pascal (c) PL/I (d) All of the above 42. Which of the following does not use the API approach? (a) MS SQL-Server (b) Sybase (c) ODBC (d) DB2 43. Which of the following command is use to produce a COBOL copybook, which contains an SQL DECLARE TABLE statement along with the WORKING STORAGE host-variable definitions for each column of the table? (a) DCLEGEN (b) BIND (c) GENERATE (d) None of the above 44. Which of the following is the SQL termination delimiters used in Ada, C, Pascal and PL/I? (a) END-EXEC (b) Hyphen (c) Semicolon (d) None of the above 45. Which of the following SQL statement tells the pre compiler automatically generate error-handling code following every executable embedded SQL statement and specifies what the generated code should do? (a) SQLCODE (b) SQLSTATE (c) WHENEVER (d) None of the above (3) SD8 46. Which of the following clause is used in the ALTER DOMAIN statement to delete a constraint? (a) DELETE CONSTRAINT (b) DROP CONSTRAINT (c) REMOVE CONSTRAINT (d) None of the above 47. Which of the following keyword is used to define a primary key in the CREATE TABLE command? (a) PRIMARY KEY (b) UNIQUE (c) PRIMARY (d) None of the above 48. Which of the following is a requirement of a client server application? (a) Make the system platform and protocol independent (b) Hide the process and make the application transparent (c) Ensure future growth as the user demand increases (d) All of the above 49. Data models falls in three different groups(a) Object based logical model. (b) Record base logical model. (c) Physical model (d) All of the above 50. A diamond in E-R diagram shows____. (a) Entities. (b) Relationship between entities. (c) Attributes of entities. (d) None of the above 51. DML is responsible for (a) Add/ modify/ Delete to database (b) Only addition. (c) Only deletion. (d) None of the above 52. Data dictionary stores. (a) Structure of the database. (b) Objects of the database. (c) Both (a) and (b) (d) None of the above 53. Data sharing is (a) Sharing of data among different users. (b) Transfer of knowledge. (c) Both (a) and (b) (d) None of the above XIX 54. File access are controlled by the (a) Owner. (b) Group. (c) Universal user. (d) None of the above 55. Basic objective of normalization is to ____ (a) Reduce redundancy. (b) Manage object. (c) Inherit object. (d) None of the above 56. _____ are the main components of object oriented systems. (a) Objects (b) Entities (c) Class (d) None of the above 57. Authentication is a process of ___ (a) Permitting users to access application. (b) Blocking users to access applications. (c) Validating the identity of users (d) None of the above 58. WAN stands for (a) World area network. (b) Wide area network. (c) Without access network. (d) None of the above 59. By default trigger are automatically ____when they are created. (a) Enabled. (b) Disabled. (c) Both (a) and (b) (d) None of the above 60. _____ are the units of data transfer to and from disk. (a) Data blocks (b) Sectors (c) Table space (d) All of the above 61. Table is consists of row and ____ (a) Rows (b) Relations. (c) Columns. (d) All of the above 62. To add data in the tables, we can use ____ operator (a) INSERT (b) UPDATE (c) MODIFY (d) None of the above (4) SD8 63. ______ is one of the commercial RDBMS available in the market. (a) DELL (b) ORACLE (c) TRANSITALIA (d) None of the above 64. Which of the following is a column in the table whose purpose is to uniquely identify records from the same table? (a) Primary key (b) Candidate key (c) Foreign key (d) Intelligent key 65. Which of the following is a valid relationship between related entities or tables? (a) One-to-one relationship (b) One-to-many relationship (c) Many-to-many relationship (d) All of the above 66. Which of the following can be a base table constraint? (a) Candidate and foreign key definition (b) CHECK CONSTRAINT definition (c) Column constraint (d) All of the above XIX 67. Client/server computing both answers and fuels the demand for ‘Information at our fingertips’. (a) True (b) False (c) Both (a) and (b) (d) None of the above 68. Which of the following is a requirement of a client server application? (a) Make the system platform and protocol independent (b) Hide the process and make the application transparent (c) Ensure future growth as the user demand increases (d) All of the above 69. This tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data. (a) Client tier (b) Applications/Web server tier (c) Enterprise server tier (d) DBA tier 70. This tier performs sophisticated calculations and manages the merging of data from multiple sources. (a) Client tier (b) Applications/Web server tier (c) Enterprise server tier (d) DBA tier (5)