FF6 1. 2. 3. 4. 5. 6. 7. 8. _______is one of the applications where distributed databases are used. (a) Software companies. (b) Airlines (c) Data Centres (d) None of the above Which is not a disadvantage of traditional file processing systems? (a) Program-data dependence (b) Reduced data redundancy (c) Limited data sharing (d) Lengthy development time Which is NOT a component of a relational database? (a) Entity (b) Table (c) Attribute (d) Hierarchy Database applications can be divided into five categories. Which is NOT a database application category? (a) Personal (b) Department (c) Enterprise (d) Relational Automated tools used to design databases and application programs are called ____ tools. (a) CASE (b) Repository (c) OLAP (d) LAN Client/server computing, data warehousing, and the Internet all became increasingly important during this period. (a) 1970s (b) 1980s (c) 1990s (d) 1960s The first step in database development, in which the scope and content is specified, is called (a) Enterprise data modeling. (b) Information engineering. (c) Information systems architecture. (d) Strategic planning factors. In this step of the SDLC, one writes, tests, and installs the programs that process the database. (a) Database implementation (b) Physical database design and definition (c) Database maintenance (d) Logical database design XIX 9. 10. 11. 12. 13. 14. 15. 16. A(n) ____ is a detailed, technology independent specification of the overall structure of the database. (a) Physical schema (b) User view (c) External schema (d) Conceptual schema This tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data. (a) Client tier (b) Applications/Web server tier (c) Enterprise server tier (d) DBA tier This tier performs sophisticated calculations and manages the merging of data from multiple sources. (a) Client tier (b) Applications/Web server tier (c) Enterprise server tier (d) DBA tier The E-R model is most often used as a tool during the ___ phase of database development. (a) Analysis (b) Feasibility (c) Design (d) Implementation Which is NOT an example of a strong entity type? (a) STUDENT (b) COURSE (c) DEPARTMENT (d) STUDENT_ID If EMPLOYEE is the entity type, then SMITH, JOHN is the entity ____. (a) Field (b) Characteristic (c) Instance (d) Identifier Which is NOT included in the database design stage of the database life cycle? (a) Resolve access conflict (b) Logical database design (c) Plan integrity controls (d) Create sub-schemas Which is NOT included in the database planning stage of the database life cycle? (a) Define operational requirements (b) Develop cost/benefit models (c) Select technologies (d) Design database environment (1) FF6 17. The fastest recovery plan involves (a) Mirrored disks. (b) Restore/rerun techniques. (c) Checkpoints. (d) A database change log. 18. A typical cause of ____ is a disk drive failure or a head crash. (a) Incorrect data (b) Aborted transactions (c) System failure (d) Database destruction 19. With ____, each transaction is restricted to a view of the database as of the time that transaction started. (a) Deadlock (b) Versioning (c) Shared locks (d) Exclusive locks 20. Another name for a synonym is a(n) (a) Alias. (b) Homonym. (c) Constraint. (d) Enterprise key. 21. Two common ways of expressing a conceptual schema are (a) Text (narrative) and physical. (b) Physical and mathematical. (c) Mathematical and graphical. (d) Graphical and text (narrative). 22. Which is NOT an advantage of a standardized relational language like SQL? (a) Reduced training costs (b) Application longevity (c) Reduced dependence on a single vendor (d) Fixing deficiencies is relatively easy 23. SQL commands can be classified into three types. Which is NOT an SQL command type? (a) DDL (b) DML (c) DGL (d) DCL 24. Which is NOT an advantage of using a view? (a) Simplify query commands (b) Provide data security (c) Enhance programming productivity (d) Decrease system overhead 25. Functions include (a) sCOUNT, MIN, and OR. (b) MAX, SUM, and AND. (c) AVG, IF, and COUNT. (d) COUNT, SUM, and AVG. XIX 26. In a basic SELECT statement, ____ sets the criteria of the query. (a) HAVING (b) GROUP BY (c) WHERE (d) ORDER BY 27. Using the ____ keyword in a sub query will check to see if any rows fit the conditions, not return values from particular columns. (a) INCLUDE (b) EXIST (c) ALL (d) ANY 28. The ____ clause is used to combine the output from multiple queries into a single result table. (a) FROM (b) UNION (c) COMBINE (d) JOIN 29. When a ____ occurs, changes to a table are undone. (a) Commit (b) Rollback (c) Auto commit (d) Update 30. If STUDENT is an object class, then Mary Jones is a(n) ____. (a) State (b) Behavior (c) Object instance (d) Identity 31. Which of the following is not a criterion that should be considered when doing requirements analysis? (a) Need (b) Correctness (c) Consistency (d) Speed 32. Which data model is independent of both the DBMS software and the hardware? (a) Conceptual (b) External (c) Internal (d) All of the above 33. Which of the following is an attribute that holds multiple values for a single entity? (a) Simple (b) Composite (c) Derived (d) Multi-valued (2) FF6 34. _______ expresses the specific number of entity occurrences associated with one occurrence of the related entity. (a) Connectivity (b) Degree (c) Cardinality (d) None of the above 35. Which of the following is the latest SQL standard? (a) SQL-82 (b) SQL-92 (c) SQL-3 (d) SQL-8 36. Which of the following is not a character string? (a) ‘Alexis Leon’ (b) 1234 (c) ‘Don’t do’ (d) ‘QWERTY’ 37. Which of the following is not a data definition language statement? (a) CREATE (b) ALTER (c) DROP (d) SELECT 38. Which of the following is not a Data Manipulation Language statement/ (a) COMMIT (b) UPDATE (c) DELETE (d) INSERT 39. Which of the following is not a comparison operator? (a) ANY (b) ALL (c) SOME (d) UNION 40. Which of the following is not a set operator/ (a) UNION (b) INTERSECT (c) LIKE (d) MINUS 41. Which of the following database object does not physically exist/ (a) Base table (b) Index (c) View (d) None of the above XIX 42. Which of the following clause is usually used together with aggregate functions? (a) ORDER BY ASC (b) ORDER BY DESC (c) GROUP BY (d) None of the above 43. Which of the following is used to get all the columns of a table? (a) # (b) * (c) % (d) @ 44. Which of the following is a component of a distributed database system? (a) Server (b) Client (c) Network (d) All of the above 45. Which of the following refers to the operation of copying and maintaining database objects in multiple databases belonging to a distributed system? (a) Backup (b) Recovery (c) Replication (d) None of the above 46. Which of the following is the probability that the system is up and running at a certain point in time? (a) Reliability (b) Availability (c) Maintainability (d) None of the above 47. Which of the following strategy is designed to ensure that either all the databases are updated or none of them are? (a) Two-phase commit (b) Two-phase locking (c) Two-phase update (d) None of the above 48. INGRES, ORACLE, SYBASE are the commercial examples of ____ (a) DBMS software’s (b) Operating system software’s (c) Bunch of software utilities (d) None of the above 49. Populating a database means ___ (a) Loading data into the database. (b) Crosschecking the database (c) Modifying the data in the database. (d) None of the above (3) FF6 50. Data isolation means ____ (a) Inaccessibility of data due to scattered & heterogenous format of data (b) Fragmented data (c) Data at no. of places (d) None of the above 51. ____________means the use of piece of information for a particular person. (a) Accuracy (b) Timeliness (c) Relevancy (d) None of the above. 52. Data consistency means ____ (a) Change in one copy of data must reflect in all the other copies of data. (b) Change in one copy of data must not reflect in all the other copies of data (c) Change in all copies of data. (d) None of the above 53. What separates the physical aspects of data storage from the logical aspects of data representation? (a) Data (b) Relationship (c) Constraints (d) Schema 54. What are the predicates that defines correct database states and the schema describes the organization of data and relationships within the database. (a) Data (b) Relationships (c) Constraints (d) Schema 55. What defines a view or views of the database for particular users? (a) Internal schema (b) External schema (c) Conceptual schema (d) None of the above. 56. Which of the following is a characteristic of data in a database? (a) Shared (b) Redundant (c) Independent (d) All of the above XIX 57. What is sequence of database operations that represents a logical unit of work & that accesses a database and transforms it from one state to another? (a) Logical unit of work (b) Transaction (c) Record (d) None of the above 58. ____is the database management activity of coordinating the action of database manipulation processes that operate concurrently access shared data and can potentially interfere with each other. (a) Transaction management. (b) Concurrency management (c) Informatics management (d) Database management 59. Which of the following is a hierarchial database? (a) IDMS (b) IMS (c) DB2 (d) Oracle 60. Network model is an example of ____ (a) Object based logical model (b) Record based logical model (c) Physical model (d) None of the above. 61. To the computer, a file is nothing more than ______ __ (a) Text (b) Image (c) Information (d) Series of bytes 62. The values of the attributes describe a particular _____________ (a) Entity (b) File (c) Instance (d) None of the above 63. Each attribute of an entity is represented in storage by a ________ (a) Data item (b) Instance (c) Field (d) None of the above 64. Which of the following operation is required for processing records in a file? (a) File creation (b) Record creation and record location (c) Record deletion and record modification (d) All of the above (4) FF6 65. What is the expansion of ISAM? (a) Internal Storage Access Mechanism (b) Index Sequential Access Method (c) Integrated Storage and Management (d) None of the above 66. What is the usual block size range? (a) 512 bytes to 4096 bytes (b) 512 kilobytes to 4096 kilobytes (c) 5120 bytes to 40960 bytes (d) None of the above 67. Which of the following is NOT true about random access memory (a) It is commonly referred to as RAM. (b) It is a type of semiconductor chip. (c) It stores the instructions and data the microprocessor executes. (d) Programs stored in this memory cannot be changed. XIX 68. When you use the World Wide Web, your browser is classified as a: (a) Operating system (b) Systems software (c) Application program (d) Client program 69. A type of storage device that stores the same data on several different disks so if one happens to crash, the other will almost always have the same data is called: (a) Magnetic tape (b) RAID (c) Optical disk (d) Microfilm 70. The use of a mouse or other pointing devices to express commands by selection icons or entries on pull-down menus is called: (a) User-friendly computing (b) Point and click (c) Windows (d) Graphical user interface (5)