SCDL SOLVED PAPERS | scdl assighnments | symbiosis assignments |scdlassignments.blogspot | scdl paper | question papers for Pghrm,scdl | scdl assignments third semester for marketing |business communication assignments, symbiosis | solved papers of scdl | FREE SCDL Assignments | SCDL ASSIGNMENTS 3 SEM PGDBA HR | FREE SCDL Assignments And Solved Papers, delhi, India | scdl pgdba assignments scdl pune symbiosis center for distance learning scdl symbiosis centre for distance learning scdl| Scdl Solved Assignments

Thursday, April 16, 2009

DBMS Assignments_DBMS Sample papers_Part4

DBMS assgn : Select The Blank
Question Diagrammatic representation in data modeling is ________to represent a model in diagrammatic notation
Correct Answer Capability
Your Answer Capability
Multiple Choice Single Answer
Question Write SQL statement, which will show contents of table book, where 2nd character of book name is 'm'
Correct Answer select * from book where book name like '_m%'
Your Answer select * from book where book name like '_m%'
Multiple Choice Multiple Answer
Question There are two kinds of tables -
Correct Answer base tables , views
Your Answer base tables , views , system , program
Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms, Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support , Data operation
True/False
Question Physical data independence is the capacity to change external schema without having to change conceptual schema.
Correct Answer False
Your Answer False
Multiple Choice Multiple Answer
Question Functions at the server end are
Correct Answer Query, Transaction
Your Answer Query, Transaction , User interface , Application Program
Multiple Choice Multiple Answer
Question The levels of abstraction of data are
Correct Answer Physical level, Logical level, View level
Your Answer Physical level, Logical level, Complex level, View level
Multiple Choice Multiple Answer
Question Requirement analysis includes
Correct Answer human factors of applications, application's functionality, all information used by application
Your Answer Human factors of applications, application's functionality, all information used by application, maintenance of data
Multiple Choice Multiple Answer
Question Which of the following is a database privilege
Correct Answer The right to connect the database, The right to create table, The right to select rows from another user's table
Your Answer System programming, The right to connect the database, The right to create table, The right to select rows from another user's table
Multiple Choice Multiple Answer
Question Write the attributes of entity "book"
Correct Answer Book_name , book_no , Price
Your Answer book , book_no , Book_name , Price
Multiple Choice Multiple Answer
Question Security considerations apply to
Correct Answer data, database , dbms , users and applications
Your Answer data, database , dbms , users and applications , variant
Multiple Choice Multiple Answer
Question Application development tools are
Correct Answer Power Builder , VB
Your Answer Power Builder , Oracle , VB , C++
True/False
Question A user can grant any object privilege on any object he or she owns to any other user or role
Correct Answer True
Your Answer True
Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control
Multiple Choice Single Answer
Question Physical data models used to describe data at what level?
Correct Answer Lowest level
Your Answer Lowest level
Match The Following
Question Correct Answer Your Answer

External level Highest level Highest level

Conceptual database design independent of implementation design independent of implementation design

Physical database design describe storage structure describe storage structure

Database design real world entities real world entities

Select The Blank
Question The users of the database don’t have to worry about ________of the database
Correct Answer internal working
Your Answer internal working
True/False
Question A schema does not separate the physical aspects of data storage from logical aspects of data representation
Correct Answer False
Your Answer False
Match The Following
Question Correct Answer Your Answer

CHAR(SIZE) To store character strings values of fixed length To store character strings values of fixed length

VARCHAR(SIZE) To stroe variable length alphanumeric data. To stroe variable length alphanumeric data.

date This data type is used to represent date and type This data type is used to represent date and type

long Used to store arrays of binary data in ASCII format Used to store hexadecimal data.

True/False
Question Using database redumdancy can be removed
Correct Answer True
Your Answer True
True/False
Question A role provides authorisation.
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Following date formats used in oracle
Correct Answer TO_CHAR() , TO_DATE()
Your Answer TO_CHAR() , TO_DATE() , DATE-TO-CHAR , CHAR-TO-DATE
True/False
Question The data in the database cannot be shared
Correct Answer False
Your Answer False
Select The Blank
Question A________is a database that can maintain information such as video,images,sounds in traditional form
Correct Answer A universal server
Your Answer Server
Select The Blank
Question ________is a process by which user's identity is checked
Correct Answer Authentication
Your Answer Authentication
Multiple Choice Single Answer
Question Access to a database can be controlled using
Correct Answer Access Privilages
Your Answer Access control
Multiple Choice Multiple Answer
Question Major difficulties in referring to the log is :
Correct Answer Time Consuming , Redoing transactions which have already written their updates to the database
Your Answer Time Consuming , Redoing transactions which have already written their updates to the database , Rechecking the log time and again , Heavy cost
Select The Blank
Question ________is a process by which the user's privileges are ascertained
Correct Answer Authorisation
Your Answer Authorisation
Multiple Choice Single Answer
Question If a user is able to manipulate system resources to deny their availabilty to other users. Then this is reffered to as
Correct Answer denial of service
Your Answer denial of service
Select The Blank
Question The information collected in requirement analysis stage is ________for information modeling
Correct Answer input
Your Answer input
True/False
Question Codd developed E-R model
Correct Answer False
Your Answer True
Multiple Choice Single Answer
Question Write output of following example SELECT lower('JOHN MARTIN') FROM DUAL;
Correct Answer john martin
Your Answer john martin
Multiple Choice Single Answer
Question Write sql statement, which will show contents of table book, where last character of bookname is 'm'
Correct Answer select * from book where bookname like '%m'
Your Answer select * from book where bookname like '%m'
Multiple Choice Single Answer
Question If role B has been previously granted to role A
Correct Answer Role A cannot be granted to role B
Your Answer Role A cannot be granted to role B
Multiple Choice Single Answer
Question Write a command to select privileges on catalog table from John.
Correct Answer REVOKE SELECT ON CATALOG FROM JOHN
Your Answer REVOKE SELECT ON CATALOG FROM JOHN
True/False
Question With the help of delete command, the structure of table is not deleted. Only rows get deleted.
Correct Answer True
Your Answer True
Select The Blank
Question ________is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based
Correct Answer Security
Your Answer Security
Multiple Choice Single Answer
Question Access to a database can be controlled using
Correct Answer Access Privilages
Your Answer Access control
Select The Blank
Question The most widely used conceptual model is________
Correct Answer E-R model
Your Answer E-R model
True/False
Question Database design model help in improving maintainability
Correct Answer True
Your Answer True
True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Write the command to update privileges on catalog table from all users
Correct Answer REVOKE UPDATE ON CATALOG FROM PUBLIC
Your Answer REVOKE UPDATE ON CATALOG FROM PUBLIC
Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Program
Multiple Choice Single Answer
Question Write command to grant UPDATE authority on catalog table to user John
Correct Answer GRANT UPDATE ON CATALOG TO JOHN
Your Answer GRANT UPDATE ON CATALOG TO JOHN
Select The Blank
Question ________is visual representation of Entity Relationships.
Correct Answer ERD
Your Answer ERD
Multiple Choice Single Answer
Question Write SQL statement, which shows contents of table book, whose price is less than 4000 and more than 1000
Correct Answer select * from book where price>1000 and price<4000
Your Answer select * from book where price>1000 and price<4000
Multiple Choice Multiple Answer
Question Three levels of database service
Correct Answer External level , Conceptual level , Physical level
Your Answer External level , Conceptual level , Physical level , Internal level

No comments:

Post a Comment