SCDL SOLVED PAPERS | scdl assighnments | symbiosis assignments |scdlassignments.blogspot | scdl paper | question papers for Pghrm,scdl | scdl assignments third semester for marketing |business communication assignments, symbiosis | solved papers of scdl | FREE SCDL Assignments | SCDL ASSIGNMENTS 3 SEM PGDBA HR | FREE SCDL Assignments And Solved Papers, delhi, India | scdl pgdba assignments scdl pune symbiosis center for distance learning scdl symbiosis centre for distance learning scdl| Scdl Solved Assignments

Thursday, April 16, 2009

DBMS Assignments_DBMS Sample papers_Part3

LIST OF ATTEMPTED QUESTIONS AND ANSWERS


Multiple Choice Single Answer
Question Immediate database modification uses :
Correct Answer Old Value & New Value
Your Answer Only Old Value


Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program


Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control


True/False
Question With the help of delete command, the structure of table is not deleted. Only rows get deleted.
Correct Answer True
Your Answer False


Multiple Choice Single Answer
Question If role B has been previously granted to role A
Correct Answer Role A cannot be granted to role B
Your Answer Role A cannot be granted to role B


Multiple Choice Single Answer
Question Physical data models used to describe data at what level?
Correct Answer Lowest level
Your Answer Lowest level


Select The Blank
Question The query language defined by Donald Chamberlain is called as________
Correct Answer Structured English Query Language
Your Answer Structured English Query Language


Select The Blank
Question The information collected in requirement analysis stage is ________for information modeling
Correct Answer input
Your Answer data


Multiple Choice Single Answer
Question Write sql statement, which will show contents of table book, where last character of bookname is 'm'
Correct Answer select * from book where bookname like '%m'
Your Answer select * from book where bookname like '%m'


Select The Blank
Question File is collection of ________
Correct Answer records
Your Answer records


Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support


Multiple Choice Multiple Answer
Question SSL protocol provides
Correct Answer authorisation , data encryption , data integrity
Your Answer authorisation , data encryption , data integrity


Multiple Choice Single Answer
Question The set of all entities of the same type called as
Correct Answer entity set
Your Answer relationship


Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model


Multiple Choice Multiple Answer
Question Which of the following is database design constraints
Correct Answer type , range , relationship
Your Answer type , range , relationship


Select The Blank
Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object
Correct Answer functions
Your Answer information


True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer True


Multiple Choice Single Answer
Question In three tier architecture, the layer which provides user interface and interacts with the user is :
Correct Answer Presentation layer
Your Answer Presentation layer


Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer attribute-entity


Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , upper(char) , stringlength(char)


Multiple Choice Single Answer
Question Write command to grant UPDATE authority on catalog table to user John
Correct Answer GRANT UPDATE ON CATALOG TO JOHN
Your Answer GRANT UPDATE ON CATALOG TO JOHN


Select The Blank
Question Entities are represented in ________in E-R diagram
Correct Answer Rectangular box
Your Answer Rectangular box


True/False
Question Relationship constraints represents relationship on values between entities
Correct Answer True
Your Answer True


Select The Blank
Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer Threat
Your Answer Threat


Match The Following
Question Correct Answer Your Answer

Object privileges One example : Privilege to delete rows from any named table One example : Privilege to delete rows from any named table

Grant command Contains 'To' clause in syntax Contains 'To' clause in syntax

Revoke command Contains 'From' clause in syntax Contains 'From' clause in syntax

System privileges can be granted any admin personnel and application developers can be granted any admin personnel and application developers



Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case


Multiple Choice Single Answer
Question Security issues become more complex in which environment
Correct Answer Network
Your Answer Network


Select The Blank
Question Based on the SEQUEL/2 or SQL IBM developed another system called________
Correct Answer System R
Your Answer System R


True/False
Question A user can grant any object privilege on any object he or she owns to any other user or role
Correct Answer True
Your Answer True


Select The Blank
Question ________is a process by which user's identity is checked
Correct Answer Authentication
Your Answer Authentication


Multiple Choice Single Answer
Question Write a command to revoke the system privileges for creating tables from 'Smita'
Correct Answer REVOKE CREATE TABLE FROM SMITA
Your Answer REVOKE CREATE TABLE FROM SMITA


Multiple Choice Single Answer
Question A database must be prtotected against
Correct Answer viruses
Your Answer viruses


True/False
Question DES provides standards based encryption for data privacy
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Different types of log based recovery are:
Correct Answer Deferred database modification , Immediate database modification , Checkpoints
Your Answer Deferred database modification , Immediate database modification , Shadow Paging


True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question What operation is used to protect data from corruption and deletion .
Correct Answer Data integrity
Your Answer Data integrity


Multiple Choice Single Answer
Question A person who has control over system is called as
Correct Answer Database administrator
Your Answer Database administrator


Select The Blank
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer difficult


Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data


True/False
Question If attribute is derived dotted line is used
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Which of the following is not a criterion that should be considered when doing requirements analysis
Correct Answer speed
Your Answer speed


Multiple Choice Multiple Answer
Question The database design model has following benefits
Correct Answer Provide a means to represent real world objects , represent relationships among real world objects , define how the objects in appliction interact in logical term
Your Answer Provide a means to represent real world objects , represent relationships among real world objects , define how the objects in appliction interact in logical term


True/False
Question A program is a collections of instructions for manipulating data
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question SSL protocol provides
Correct Answer authorisation , data encryption , data integrity
Your Answer authorisation , data encryption , data integrity


Select The Blank
Question A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization
Correct Answer Threat
Your Answer Threat

No comments:

Post a Comment