DBMS assgn :2: Select The Blank
Question ________provides a graphical means of modeling various components of software system
Correct Answer UML
Your Answer ERD
True/False
Question Internal schema means how and where data are organized in physical data storage
Correct Answer True
Your Answer True
Multiple Choice Multiple Answer
Question Some clauses of GRANT command are as follows
Correct Answer ALL , ON , PUBLIC
Your Answer ALL , ON , PUBLIC , ANY
Select The Blank
Question Structctural validity in data modeling means ________
Correct Answer consistency
Your Answer consistency
Multiple Choice Multiple Answer
Question Database Management System Provides the facilities of
Correct Answer Security , Atomicity
Your Answer Concurrent – access anomalies , Security , Atomicity , Data redundancy
True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False
Multiple Choice Single Answer
Question The set of all relationships of the same type called as
Correct Answer Relationship set
Your Answer Relationship set
Multiple Choice Multiple Answer
Question Security considerations apply to
Correct Answer data, database , dbms , users and applications
Your Answer data, database , dbms , users and applications , variant
Multiple Choice Multiple Answer
Question Functions at the Client end are
Correct Answer User interface , Application program
Your Answer Query , Transaction , User interface , Application program
Multiple Choice Single Answer
Question Which attribute holds multiple values for single entity.
Correct Answer Multi valued attribute
Your Answer Multi valued attribute
Select The Blank
Question Database design model helps in improving________
Correct Answer maintainability
Your Answer maintainability
True/False
Question To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY';
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Write command to give system privileges for creating tables and views to Meera
Correct Answer GRANT CREATE TABLE,CREATE VIEW TO MEERA
Your Answer GRANT CREATE TABLE,CREATE VIEW TO MEERA
Select The Blank
Question ________means data is protected from deletion and corruption, both while it resides within database
Correct Answer Data integrity
Your Answer Data integrity
Match The Following
Question Correct Answer Your Answer
Grant command Contains 'To' clause in syntax Contains 'To' clause in syntax
Revoke command Contains 'From' clause in syntax Contains 'From' clause in syntax
System privileges can be granted any admin personnel and application developers can be granted any admin personnel and application developers
Object privileges One example : Privilege to delete rows from any named table One example : Privilege to delete rows from any named table
Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain
Match The Following
Question Correct Answer Your Answer
UML Unified modeling language Unified modeling language
DBMS Data base management system Data base management system
RDBMS Relational DBMS Relational DBMS
DBA Data base administrator Data base administrator
Select The Blank
Question ________are used to find and steal user names and passwords
Correct Answer Packet sniffers
Your Answer Packet sniffers
True/False
Question The database is partitioned into some number of fixed length block called as pages.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question ( _ ) stands for
Correct Answer any single character in character string
Your Answer any single character in character string
Multiple Choice Single Answer
Question Character strings are written as a sequence of characters in
Correct Answer Single quotes
Your Answer Single quotes
Select The Blank
Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges.
Correct Answer Access control
Your Answer Access control
Multiple Choice Multiple Answer
Question A Database Management System has several subsystems
Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem
Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem
Multiple Choice Multiple Answer
Question Block movements between disk and main memory are initiated through 2 operations namely:
Correct Answer Input , Output
Your Answer Input , Output , Update , Move
True/False
Question Distinct clause in select command eliminates rows that have exactly same contents in each column.
Correct Answer True
Your Answer False
Multiple Choice Multiple Answer
Question What are secured using authorisation and access control.
Correct Answer The intranet , local clients , opearators
Your Answer The intranet , local clients , opearators , the internet
Multiple Choice Multiple Answer
Question Specify any three string functions used in SQL
Correct Answer lower(char) , initcap(char) , upper(char)
Your Answer lower(char) , initcap(char) , upper(char) , stringlength(char)
Multiple Choice Single Answer
Question Write a command to grant all privileges on BOOK TABLE to user "Mathews"
Correct Answer GRANT ALL ON BOOK TO MATHEWS
Your Answer GRANT ALL ON BOOK TO MATHEWS
Multiple Choice Single Answer
Question What type of Database system can have the actual database and Database sytem software spread over many sites, which is connected over computer network?
Correct Answer Distributed
Your Answer Distributed
Select The Blank
Question Data types BIT and BIT VARYING are known as ________
Correct Answer Bit string data types
Your Answer Bit data types
Select The Blank
Question A________is collection of tables where table is an unordered collection of rows
Correct Answer Relational Database
Your Answer Relational Database
Multiple Choice Single Answer
Question Malfunctioning of the hardware, or bug in the database software or operating system is called as
Correct Answer System Crash
Your Answer System Crash
Multiple Choice Multiple Answer
Question The different types of database users
Correct Answer Security officers , Database administrators , Network administrators
Your Answer Security officers , Database administrators , Network administrators , Database operators
Multiple Choice Single Answer
Question Which databse level is one closest to users
Correct Answer External
Your Answer External
True/False
Question In the hierarchical model, records are organized as a collection of trees.
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Create table catalog having similar structure as book
Correct Answer CREATE TABLE CATALOG LIKE BOOK
Your Answer CREATE TABLE CATALOG LIKE BOOK
True/False
Question A Database management system must have a failure recovery system.
Correct Answer True
Your Answer True
Select The Blank
Question Integrated computer aided manufacturing studies is long form of ________
Correct Answer ICAM
Your Answer ICAM
Multiple Choice Single Answer
Question Data can be inserted by row in a table following command can be used.
Correct Answer INSERT
Your Answer INSERT
True/False
Question If company policy does not support more than 100 employees in a department . So Dept-Emp relationship is "one to many relationship"
Correct Answer True
Your Answer True
Multiple Choice Single Answer
Question Immediate database modification uses :
Correct Answer Old Value & New Value
Your Answer Only New Value
True/False
Question The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security
Correct Answer False
Your Answer True
Multiple Choice Multiple Answer
Question Drawbacks of shadow paging are :
Correct Answer Commit overheads , Garbage collection , Data fragmentation
Your Answer Time Consuming , Commit overheads , Garbage collection , Data fragmentation
Select The Blank
Question Based on the SEQUEL/2 or SQL IBM developed another system called________
Correct Answer System R
Your Answer System R
Multiple Choice Multiple Answer
Question Different types of log based recovery are:
Correct Answer Deferred database modification , Immediate database modification , Checkpoints
Your Answer Deferred database modification , Immediate database modification , Checkpoints , Shadow Paging
Multiple Choice Multiple Answer
Question The database design model has following benefits
Correct Answer Provide a means to represent real world objects , represent relationships among real world objects , define how the objects in appliction interact in logical term
Your Answer Hardware manipulations , Provide a means to represent real world objects , represent relationships among real world objects , define how the objects in appliction interact in logical term
True/False
Question DES provides standards based encryption for data privacy
Correct Answer True
Your Answer True
Fun and Fun only Recent Posts: |
Thursday, April 16, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment