Fun and Fun only Recent Posts: |
Monday, April 6, 2009
DBMS Assignments_DBMS Sample papers
Database management system : DBMS LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Multiple Answer Database management system : DBMS
Question Following are properties of roles allowed for easier privilege management
Correct Answer Reduced privilege administration , Dynamic privilege administration , application awareness
Your Answer Reduced privilege administration , Dynamic privilege administration
Multiple Choice Single Answer Database management system : DBMS
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer entity set
Multiple Choice Multiple Answer Database management system : DBMS
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer Integrity constraints , Database triggers
True/False Database management system : DBMS
Question A role provides authorisation.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question A Database Management System has several subsystems
Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem
Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem
Select The Blank Database management system : DBMS
Question ________ is one closest to the users
Correct Answer logical level
Your Answer physical level
Multiple Choice Single Answer
Question Write a command to revoke the system privileges for creating tables from 'Smita'
Correct Answer REVOKE CREATE TABLE FROM SMITA
Your Answer REVOKE CREATE TABLE FROM SMITA
True/False
Question If attribute is multi-valued then single lines are used
Correct Answer False
Your Answer False
Select The Blank Database management system : DBMS
Question Data types BIT and BIT VARYING are known as ________
Correct Answer Bit string data types
Your Answer Bit data types
True/False Database management system : DBMS
Question A user can grant any object privilege on any object he or she owns to any other user or role
Correct Answer True
Your Answer True
Select The Blank
Question The Crow's tool model was developed by________
Correct Answer C. W. Bachman
Your Answer C. W. Bachman
Select The Blank
Question A ________is permission to access a named object in a prescribed manner
Correct Answer Previlege
Your Answer Previlege
Multiple Choice Multiple Answer Database management system : DBMS
Question Some examples of character strings are
Correct Answer 'SQL-92' , ' 9897' , ' Physical level** &&'
Your Answer 'SQL-92' , ' 9897' , ' Physical level** &&'
Multiple Choice Multiple Answer
Question Some clauses of GRANT command are as follows
Correct Answer ALL , ON , PUBLIC
Your Answer ALL , ON , PUBLIC
Select The Blank Database management system : DBMS
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer independent
Match The Following
Question Correct Answer Your Answer
long Used to store arrays of binary data in ASCII format Used to store binary data
CHAR(SIZE) To store character strings values of fixed length To store character strings values of fixed length
VARCHAR(SIZE) To stroe variable length alphanumeric data. To stroe variable length alphanumeric data.
date This data type is used to represent date and type This data type is used to represent date and type
Multiple Choice Single Answer Database management system : DBMS
Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Multiple Choice Multiple Answer
Question The back end manages
Correct Answer Access Structures , Concurrency control
Your Answer Access Structures , Report writers , Concurrency control
Multiple Choice Multiple Answer
Question Database Management System Provides the facilities of
Correct Answer Security , Atomicity
Your Answer Concurrent – access anomalies , Security , Data redundancy
True/False
Question SQL is low level language
Correct Answer False
Your Answer True
True/False
Question Active database system provide active rules, that can automatically initiate actions, when certain events occur.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question There are two types of views
Correct Answer updatable views , non updatable views
Your Answer updatable views , non updatable views
Multiple Choice Single Answer
Question If each role granted to a user is either
Correct Answer enabled or disabled
Your Answer enabled or disabled
True/False
Question physical design is tailored to a specific DBMS system
Correct Answer True
Your Answer True
True/False
Question A role provides authorisation.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer security , Integrity constraints , roles
Select The Blank Database management system : DBMS
Question ________is a process by which user's identity is checked
Correct Answer Authentication
Your Answer Access control
Match The Following Database management system : DBMS
Question Correct Answer Your Answer
Authorisation permission given to user permission given to user
Previlege Permission for accessing objects Permission for accessing objects
Role Provide authority permission given to user
Integrity hallmark of data security formation of objects
Multiple Choice Single Answer
Question Degree of relationship indicates no of associated -
Correct Answer Entities
Your Answer Entities
Multiple Choice Single Answer
Question Write a syntax of SELECT which shows unique records only.
Correct Answer SELECT DISTINCT * FROM
Your Answer SELECT DISTINCT * FROM
Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data
Multiple Choice Single Answer
Question The compiler which translates DML statements in Query language into low level instructions is called -
Correct Answer DML compiler
Your Answer DML compiler
Multiple Choice Multiple Answer
Question Which of the following are object oriented features
Correct Answer Inheritance , Abstraction
Your Answer Inheritance , Abstraction , Polymerisation
Multiple Choice Multiple Answer
Question Block movements between disk and main memory are initiated through 2 operations namely:
Correct Answer Input , Output
Your Answer Output , Update , Move
True/False
Question Schemas are changed infrequently
Correct Answer True
Your Answer True
True/False
Question Security is important issue in database management .
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Shadow paging technique maintains two pages during the life time of a transaction namely :
Correct Answer Current page & Shadow page
Your Answer Current Page & Last page
Multiple Choice Single Answer
Question What is called for network of network scatered all over the world
Correct Answer internet
Your Answer internet
Multiple Choice Single Answer
Question What can be used to convey the designer's understanding of the information requirement of the organization.
Correct Answer Data model
Your Answer Data model
Multiple Choice Multiple Answer
Question What are secured using authorisation and access control.
Correct Answer The intranet , local clients , opearators
Your Answer The intranet , local clients , the internet
True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer True
Multiple Choice Single Answer
Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program
Select The Blank
Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer Threat
Your Answer Project
Select The Blank
Question ________are installed to eavesdrop on network traffic
Correct Answer Network sniffers
Your Answer Network sniffers
Multiple Choice Single Answer
Question Security issues become more complex in which environment
Correct Answer Network
Your Answer Network
Select The Blank
Question A________is a database that can maintain information such as video,images,sounds in traditional form
Correct Answer A universal server
Your Answer Server
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment