LIST OF ATTEMPTED QUESTIONS AND ANSWERS
Multiple Choice Single Answer
Question Immediate database modification uses :
Correct Answer Old Value & New Value
Your Answer Only Old Value
Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program
Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control
True/False
Question With the help of delete command, the structure of table is not deleted. Only rows get deleted.
Correct Answer True
Your Answer False
Multiple Choice Single Answer
Question If role B has been previously granted to role A
Correct Answer Role A cannot be granted to role B
Your Answer Role A cannot be granted to role B
Multiple Choice Single Answer
Question Physical data models used to describe data at what level?
Correct Answer Lowest level
Your Answer Lowest level
Select The Blank
Question The query language defined by Donald Chamberlain is called as________
Correct Answer Structured English Query Language
Your Answer Structured English Query Language
Select The Blank
Question The information collected in requirement analysis stage is ________for information modeling
Correct Answer input
Your Answer data
Multiple Choice Single Answer
Question Write sql statement, which will show contents of table book, where last character of bookname is 'm'
Correct Answer select * from book where bookname like '%m'
Your Answer select * from book where bookname like '%m'
Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer records
Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain
Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Multiple Choice Multiple Answer
Question SSL protocol provides
Correct Answer authorisation , data encryption , data integrity
Your Answer authorisation , data encryption , data integrity
Multiple Choice Single Answer
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer relationship
Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model
Multiple Choice Multiple Answer
Question Which of the following is database design constraints
Correct Answer type , range , relationship
Your Answer type , range , relationship
Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer information
True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer True
Multiple Choice Single Answer
Question In three tier architecture, the layer which provides user interface and interacts with the user is :
Correct Answer Presentation layer
Your Answer Presentation layer
Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer attribute-entity
Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , upper(char) , stringlength(char)
Multiple Choice Single Answer
Question Write command to grant UPDATE authority on catalog table to user John
Correct Answer GRANT UPDATE ON CATALOG TO JOHN
Your Answer GRANT UPDATE ON CATALOG TO JOHN
Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer Rectangular box
True/False
Question Relationship constraints represents relationship on values between entities
Correct Answer True
Your Answer True
Select The Blank
Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer Threat
Your Answer Threat
Match The Following
Question Correct Answer Your Answer
Object privileges One example : Privilege to delete rows from any named table One example : Privilege to delete rows from any named table
Grant command Contains 'To' clause in syntax Contains 'To' clause in syntax
Revoke command Contains 'From' clause in syntax Contains 'From' clause in syntax
System privileges can be granted any admin personnel and application developers can be granted any admin personnel and application developers
Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case
Multiple Choice Single Answer
Question Security issues become more complex in which environment
Correct Answer Network
Your Answer Network
Select The Blank
Question Based on the SEQUEL/2 or SQL IBM developed another system called________
Correct Answer System R
Your Answer System R
True/False
Question A user can grant any object privilege on any object he or she owns to any other user or role
Correct Answer True
Your Answer True
Select The Blank
Question ________is a process by which user's identity is checked
Correct Answer Authentication
Your Answer Authentication
Multiple Choice Single Answer
Question Write a command to revoke the system privileges for creating tables from 'Smita'
Correct Answer REVOKE CREATE TABLE FROM SMITA
Your Answer REVOKE CREATE TABLE FROM SMITA
Multiple Choice Single Answer
Question A database must be prtotected against
Correct Answer viruses
Your Answer viruses
True/False
Question DES provides standards based encryption for data privacy
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Different types of log based recovery are:
Correct Answer Deferred database modification , Immediate database modification , Checkpoints
Your Answer Deferred database modification , Immediate database modification , Shadow Paging
True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity
Multiple Choice Single Answer
Question A person who has control over system is called as
Correct Answer Database administrator
Your Answer Database administrator
Select The Blank
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer difficult
Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data
True/False
Question If attribute is derived dotted line is used
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Which of the following is not a criterion that should be considered when doing requirements analysis
Correct Answer speed
Your Answer speed
Multiple Choice Multiple Answer
Question The database design model has following benefits
Correct Answer Provide a means to represent real world objects , represent relationships among real world objects , define how the objects in appliction interact in logical term
Your Answer Provide a means to represent real world objects , represent relationships among real world objects , define how the objects in appliction interact in logical term
True/False
Question A program is a collections of instructions for manipulating data
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question SSL protocol provides
Correct Answer authorisation , data encryption , data integrity
Your Answer authorisation , data encryption , data integrity
Select The Blank
Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer Threat
Your Answer Threat
Fun and Fun only Recent Posts: |
Thursday, April 16, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment