SCDL SOLVED PAPERS | scdl assighnments | symbiosis assignments |scdlassignments.blogspot | scdl paper | question papers for Pghrm,scdl | scdl assignments third semester for marketing |business communication assignments, symbiosis | solved papers of scdl | FREE SCDL Assignments | SCDL ASSIGNMENTS 3 SEM PGDBA HR | FREE SCDL Assignments And Solved Papers, delhi, India | scdl pgdba assignments scdl pune symbiosis center for distance learning scdl symbiosis centre for distance learning scdl| Scdl Solved Assignments

Thursday, April 16, 2009

DBMS Assignments_DBMS Sample papers_Part6

LIST OF ATTEMPTED QUESTIONS AND ANSWERS


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support


Select The Blank
Question ________regulates all user access to named objects through privileges
Correct Answer Discretionary access control
Your Answer Discretionary access control


True/False
Question The database is partitioned into some number of fixed length block called as pages.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Write names of high level languages
Correct Answer COBOL , Pascal , Assembly
Your Answer COBOL , Pascal , English


True/False
Question Range constraints allow a limitation of range of information representations that attribute can have
Correct Answer False
Your Answer True


True/False
Question A Database management system must have a failure recovery system.
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Physical data models used to describe data at what level?
Correct Answer Lowest level
Your Answer Lowest level


Multiple Choice Multiple Answer
Question Some clauses of Revoke command are as follows
Correct Answer FROM , ON
Your Answer FROM , ON


Multiple Choice Single Answer
Question Which methods is used to capture the static and dynamic attributes of real entities
Correct Answer database
Your Answer Attributes


True/False
Question Encryption alone is sufficient to secure the data.
Correct Answer False
Your Answer False


Select The Blank
Question The information collected in requirement analysis stage is ________for information modeling
Correct Answer input
Your Answer input


Multiple Choice Single Answer
Question WWW stands for
Correct Answer World wide web
Your Answer World wide web


Select The Blank
Question In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language
Correct Answer ANSI American national std institute
Your Answer ANSI American national std institute


Select The Blank
Question SQL as a language is________of the way it is implemented internally.
Correct Answer independent
Your Answer independent


Multiple Choice Single Answer
Question When two entities are associated then the relationship exists is called :
Correct Answer binary relationship
Your Answer binary relationship


Multiple Choice Single Answer
Question Grant the SELECT authority on catalog table to user "Reema" with capability to grant those privileges to other users on catalog table
Correct Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION
Your Answer GRANT SELECT ON CATALOG TO REEMA WITH GRANT OPTION


Select The Blank
Question Database design model helps in improving________
Correct Answer maintainability
Your Answer maintainability


Multiple Choice Multiple Answer
Question To be able to successfully design and maintain databases we have to do following
Correct Answer Identify relationship between objects , Identify worlds data is of interest to us , Data dictionary
Your Answer Identify relationship between objects , Identify worlds data is of interest to us


Multiple Choice Single Answer
Question Write SQL statement, which shows contents of table book, whose price is less than 4000 and more than 1000
Correct Answer select * from book where price>1000 and price<4000
Your Answer select * from book where price>1000 and price<4000


Multiple Choice Multiple Answer
Question What can be used to manage databases data integrity rule
Correct Answer Integrity constraints , Database triggers
Your Answer Integrity constraints , Database triggers


True/False
Question The Database administrator cannot grant or revoke privileges to users.
Correct Answer False
Your Answer False


Multiple Choice Single Answer
Question Which of the following is time dependent constraint
Correct Answer Temporal
Your Answer Temporal


Select The Blank
Question ________are collection of instructions for manipulating data
Correct Answer program
Your Answer program


Match The Following
Question Correct Answer Your Answer

Object privileges One example : Privilege to delete rows from any named table One example : Privilege to delete rows from any named table

Grant command Contains 'To' clause in syntax Contains 'To' clause in syntax

Revoke command Contains 'From' clause in syntax Contains 'From' clause in syntax

System privileges can be granted any admin personnel and application developers can be granted any admin personnel and application developers



Multiple Choice Multiple Answer
Question The back end manages
Correct Answer Access Structures , Concurrency control
Your Answer Access Structures , Concurrency control


Multiple Choice Single Answer
Question Shadow paging technique maintains two pages during the life time of a transaction namely :
Correct Answer Current page & Shadow page
Your Answer Current page & Shadow page


True/False
Question Availability is often thoutht of as continuity of service, ensuring that database is available 24 hours a day, 7 days a week
Correct Answer True
Your Answer True


Multiple Choice Single Answer
Question Immediate database modification uses :
Correct Answer Old Value & New Value
Your Answer Old Value & New Value


True/False
Question If company policy does not support more than 100 employees in a department . So Dept-Emp relationship is "one to many relationship"
Correct Answer True
Your Answer True


Select The Blank
Question A ________is permission to access a named object in a prescribed manner
Correct Answer Previlege
Your Answer Previlege


Multiple Choice Single Answer
Question In an Entity relationship diagram what does a diamond represent?
Correct Answer Relationship among the entity set
Your Answer Relationship among the entity set


Multiple Choice Multiple Answer
Question Three levels of database service
Correct Answer External level , Conceptual level , Physical level
Your Answer External level , Conceptual level , Physical level


Multiple Choice Single Answer
Question The compiler which translates DML statements in Query language into low level instructions is called -
Correct Answer DML compiler
Your Answer DML compiler


Match The Following
Question Correct Answer Your Answer

Object privileges One example : Privilege to delete rows from any named table One example : Privilege to delete rows from any named table

Grant command Contains 'To' clause in syntax Contains 'To' clause in syntax

Revoke command Contains 'From' clause in syntax Contains 'From' clause in syntax

System privileges can be granted any admin personnel and application developers can be granted any admin personnel and application developers



Select The Blank
Question Enitity name is written in ________in E-R diagram
Correct Answer upper case
Your Answer upper case


True/False
Question A schema does not separate the physical aspects of data storage from logical aspects of data representation
Correct Answer False
Your Answer False


True/False
Question In the hierarchical model, records are organized as a collection of trees.
Correct Answer True
Your Answer True


Multiple Choice Multiple Answer
Question Two catagories of privileges are
Correct Answer System privilege , Object privilege
Your Answer System privilege , Object privilege


Multiple Choice Multiple Answer
Question Requirement analysis includes
Correct Answer human factors of applications , application's functionality , all information used by application
Your Answer human factors of applications , application's functionality , all information used by application


Select The Blank
Question Each attribute is associted with set of values called as________
Correct Answer Domain
Your Answer Domain


True/False
Question With the help of delete command, the structure of table is not deleted. Only rows get deleted.
Correct Answer True
Your Answer True


Select The Blank
Question ________are installed to eavesdrop on network traffic
Correct Answer Network sniffers
Your Answer Network sniffers


Multiple Choice Multiple Answer
Question Which of the following are functions of DBA
Correct Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support
Your Answer Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support


Select The Blank
Question ________are binary computer representations of stored logical entities
Correct Answer Data
Your Answer Data


Multiple Choice Multiple Answer
Question There are two kinds of tables -
Correct Answer base tables , views
Your Answer base tables , views


Multiple Choice Multiple Answer
Question Security considerations apply to
Correct Answer data, database , dbms , users and applications
Your Answer data, database , dbms , users and applications


Multiple Choice Single Answer
Question Data can be inserted by row in a table following command can be used.
Correct Answer INSERT
Your Answer INSERT

No comments:

Post a Comment