SD8

advertisement
SD8
1.
2.
3.
4.
5.
6.
7.
Which of the following is a database
service level?
(a) External
(b) Physical
(c) Conceptual
(d) All of the above
Which of the following is not a criterion
that should be considered when doing
requirements analysis?
(a) Need
(b) Correctness
(c) Consistency
(d) Speed
DML stands for _________________.
(a) Data Mining Language
(b) Dependency Maintenance Link
(c) Data Manipulation Language
(d) None of the above
Which of the following is an attribute
that represents a value that is derivable
from the value of a related attribute or
set of attributes, not necessarily in the
same entity?
(a) Single-valued
(b) Multi-valued
(c) Atomic
(d) Derived
What is a relationship called when an
association is maintained between two
entities/
(a) Unary
(b) Binary
(c) Ternary
(d) Quaternary
_______ expresses the specific
number
of
entity
occurrences
associated with one occurrence of the
related entity.
(a) Connectivity
(b) Degree
(c) Cardinality
(d) None of the above
Which of the following is a valid SQL
data type?
(a) CHARACTER
(b) NUMERIC
(c) FLOAT
(d) All of the above
XIX
8.
9.
10.
11.
12.
13.
14.
Which of the following is a comparison
operator?
(a) =
(b) LIKE
(c) BETWEEN
(d) All of the above
Which of the following is not a
comparison operator?
(a) ANY
(b) ALL
(c) SOME
(d) UNION
In which of the following cases will the
RDBMS specify a default value for the
column if there are no values for it?
(a) NOT NULL WITH DEFAULT
(b) COLUMN DEFAULT
(c) NOT NULL UNIQUE
(d) None of the above
Which of the following clause specifies
the table or tables from where the data
has to be retrieved/
(a) TABLE
(b) FROM
(c) WHERE
(d) None of the above
Which of the following keyword is used
to eliminate duplicate rows from the
query result?
(a) NO DUPLICATE
(b) UNIQUE
(c) DISTINCT
(d) None of the above
Which of the following computing model
is used by distributed database
systems?
(a) Mainframe computing model
(b) Disconnected personal computing
model
(c) Client/server computing model
(d) None of the above
Which of the following refers to the fact
that the command used to perform a
task independent of the location of the
data and location of the system where
the command was issued?
(a) Naming Transparency
(b) Location Transparency
(c) Fragmentation Transparency
(d) All of the above
(1)
SD8
15. What is data about data called?
(a) Metadata
(b) Data catalog
(c) Information
(d) None of the above
16. Metadata means ___
(a) Data about data.
(b) Data in records
(c) Scattered data
(d) None of the above
17. Populating a database means ___
(a) Loading data into the database.
(b) Crosschecking the database
(c) Modifying the data in the database.
(d) None of the above
18. Atomicity means ___
(a) A transaction is either in full or null.
(b) A commited transaction.
(c) Dual transction
(d) None of the above
19. Database systems are designed to ___
(a) Manage large bodies of information
(b) To bundle data at one place.
(c) To operate on scattered data
(d) None of the above
20. Security of data means ____
(a) Not every user of database system
should be able to access all the
data.
(b) System can be accessible to all
users.
(c) System should block users.
(d) None of the above
21. What defines a view or views of the
database for particular users?
(a) Internal schema
(b) External schema
(c) Conceptual schema
(d) None of the above.
22. Which of
the following
is a
characteristic of data in a database?
(a) Shared
(b) Redundant
(c) Independent
(d) All of the above
23. Which of the following is a hierarchial
database?
(a) IDMS
(b) IMS
(c) DB2
(d) Oracle
XIX
24. ER model is an example of
(a) Object based logical model.
(b) Record based logical model.
(c) Physical model.
(d) None of the above
25. To the computer, a file is nothing more
than __________
(a) Text
(b) Image
(c) Information
(d) Series of bytes
26. The values of the attributes describe a
particular _____________
(a) Entity
(b) File
(c) Instance
(d) None of the above
27. An ______ of the entity is represented
by a set of specific values for each of
the attributes.
(a) Manifestation
(b) Occurrence
(c) Instance
(d) None of the above
28. Which of the following stores data that
is permanent in nature?
(a) Master
(b) Transaction
(c) Report
(d) None of the above
29. Which of the following is the critical
factor that enables managers and
organizations to gain a competitive
edge in world that focuses on
achievement and advantage?
(a) More Manpower
(b) More Capacity
(c) Quality Information
(d) None of the above
30. Student ID, employee ID, part number,
etc. are examples of:
(a) Fields
(b) Primary keys
(c) Unique record identifiers
(d) All of the above
31. During direct file processing, if the
index is in record key sequence, then
which is the most efficient procedure for
locating a key?
(a) Linear Search
(b) Sequential Search
(c) Binary Search
(d) None of the above
(2)
SD8
32. When data are frequently added to or
deleted from a file, the file is said to
have a high _________
(a) Relevancy
(b) Quality
(c) Accuracy
(d) Volatility
33. Data ________ refers to the timeliness
of data.
(a) Integrity
(b) Redundancy
(c) Currency
(d) None of the above
34. Which of the following is the formal
process for deciding which attributes
should be grouped together in a
relation?
(a) Normalization
(b) Performance tuning
(c) Optimization
(d) None of the above
35. Who developed the BCNF?
(a) Boyd and Cromwell
(b) Date and Codd
(c) Date and White
(d) Boyce and Codd
36. Which of the following is a formal
process of developing data structures
in a manner that eliminates redundancy
and promotes integrity?
(a) Normalization
(b) Compilation
(c) Performance tuning
(d) Information modeling
37. Which of the following is a valid
relationship between related entities or
tables?
(a) One-to-one relationship
(b) One-to-many relationship
(c) Many-to-many relationship
(d) All of the above
38. Which of the following is used to
express a many-to-many relationship?
(a) Union tables
(b) Join tables
(c) Intersection tables
(d) None of the above
XIX
39. What are two or more relationship
among tables that are related closely
enough so that they can be resolved
into a single relationship?
(a) Complex relationships
(b) Complex multiple relationships
(c) Semantically
related
multiple
relationships
(d) None of the above
40. Like SELECT statement the update
statements operate on ___________
(a) Table
(b) Columns
(c) Both (a) and (b)
(d) None of the above
41. Which of the following is the host language?
(a) COBOL
(b) Pascal
(c) PL/I
(d) All of the above
42. Which of the following does not use the
API approach?
(a) MS SQL-Server
(b) Sybase
(c) ODBC
(d) DB2
43. Which of the following command is use
to produce a COBOL copybook, which
contains an SQL DECLARE TABLE
statement along with the WORKING
STORAGE host-variable definitions for
each column of the table?
(a) DCLEGEN
(b) BIND
(c) GENERATE
(d) None of the above
44. Which of the following is the SQL
termination delimiters used in Ada, C,
Pascal and PL/I?
(a) END-EXEC
(b) Hyphen
(c) Semicolon
(d) None of the above
45. Which of the following SQL statement
tells the pre compiler automatically
generate error-handling code following
every executable embedded SQL
statement and specifies what the
generated code should do?
(a) SQLCODE
(b) SQLSTATE
(c) WHENEVER
(d) None of the above
(3)
SD8
46. Which of the following clause is used in
the ALTER DOMAIN statement to
delete a constraint?
(a) DELETE CONSTRAINT
(b) DROP CONSTRAINT
(c) REMOVE CONSTRAINT
(d) None of the above
47. Which of the following keyword is used
to define a primary key in the CREATE
TABLE command?
(a) PRIMARY KEY
(b) UNIQUE
(c) PRIMARY
(d) None of the above
48. Which of the following is a requirement
of a client server application?
(a) Make the system platform and
protocol independent
(b) Hide the process and make the
application transparent
(c) Ensure future growth as the user
demand increases
(d) All of the above
49. Data models falls in three different
groups(a) Object based logical model.
(b) Record base logical model.
(c) Physical model
(d) All of the above
50. A diamond in E-R diagram shows____.
(a) Entities.
(b) Relationship between entities.
(c) Attributes of entities.
(d) None of the above
51. DML is responsible for
(a) Add/ modify/ Delete to database
(b) Only addition.
(c) Only deletion.
(d) None of the above
52. Data dictionary stores.
(a) Structure of the database.
(b) Objects of the database.
(c) Both (a) and (b)
(d) None of the above
53. Data sharing is
(a) Sharing of data among different
users.
(b) Transfer of knowledge.
(c) Both (a) and (b)
(d) None of the above
XIX
54. File access are controlled by the
(a) Owner.
(b) Group.
(c) Universal user.
(d) None of the above
55. Basic objective of normalization is to
____
(a) Reduce redundancy.
(b) Manage object.
(c) Inherit object.
(d) None of the above
56. _____ are the main components of
object oriented systems.
(a) Objects
(b) Entities
(c) Class
(d) None of the above
57. Authentication is a process of ___
(a) Permitting users to access application.
(b) Blocking users to access applications.
(c) Validating the identity of users
(d) None of the above
58. WAN stands for
(a) World area network.
(b) Wide area network.
(c) Without access network.
(d) None of the above
59. By default trigger are automatically
____when they are created.
(a) Enabled.
(b) Disabled.
(c) Both (a) and (b)
(d) None of the above
60. _____ are the units of data transfer to
and from disk.
(a) Data blocks
(b) Sectors
(c) Table space
(d) All of the above
61. Table is consists of row and ____
(a) Rows
(b) Relations.
(c) Columns.
(d) All of the above
62. To add data in the tables, we can use
____ operator
(a) INSERT
(b) UPDATE
(c) MODIFY
(d) None of the above
(4)
SD8
63. ______ is one of the commercial
RDBMS available in the market.
(a) DELL
(b) ORACLE
(c) TRANSITALIA
(d) None of the above
64. Which of the following is a column in
the table whose purpose is to uniquely
identify records from the same table?
(a) Primary key
(b) Candidate key
(c) Foreign key
(d) Intelligent key
65. Which of the following is a valid
relationship between related entities or
tables?
(a) One-to-one relationship
(b) One-to-many relationship
(c) Many-to-many relationship
(d) All of the above
66. Which of the following can be a base
table constraint?
(a) Candidate and foreign key definition
(b) CHECK CONSTRAINT definition
(c) Column constraint
(d) All of the above
XIX
67. Client/server computing both answers
and fuels the demand for ‘Information
at our fingertips’.
(a) True
(b) False
(c) Both (a) and (b)
(d) None of the above
68. Which of the following is a requirement
of a client server application?
(a) Make the system platform and
protocol independent
(b) Hide the process and make the
application transparent
(c) Ensure future growth as the user
demand increases
(d) All of the above
69. This tier processes HTTP protocol,
scripting tasks, performs calculations,
and provides access to data.
(a) Client tier
(b) Applications/Web server tier
(c) Enterprise server tier
(d) DBA tier
70. This
tier
performs
sophisticated
calculations and manages the merging
of data from multiple sources.
(a) Client tier
(b) Applications/Web server tier
(c) Enterprise server tier
(d) DBA tier
(5)
Download