Scdl - Databse Management

  • October 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Scdl - Databse Management as PDF for free.

More details

  • Words: 5,025
  • Pages: 34
SCDL – 2nd Semester – Database Management Systems LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/False Question

Database design model help in improving maintainability

Correct Answer

True

Your Answer

True

Multiple Choice Single Answer Question Which of the following is not a criterion that should be considered when doing requirements analysis Correct Answer speed Your Answer

consistency

True/False Question

Non-updatable views are called as 'write-only-views'.

Correct Answer

False

Your Answer

True

Multiple Choice Single Answer Question If a user is able to manipulate system resources to deny their availabilty to other users. Then this is reffered to as Correct Answer denial of service Your Answer

denial of service

Multiple Choice Multiple Answer Question Which of the following are valid SQL commands. Correct Answer

ALTER , UPDATE

Your Answer

ALTER , UPDATE , CHANGE

Multiple Choice Single Answer Question What is alternative name for functions Correct Answer

methods

Your Answer

programs

Multiple Choice Multiple Answer Question Functions at the server end are

Page 1 of 34

SCDL – 2nd Semester – Database Management Systems Correct Answer

Query , Transaction

Your Answer

Query , Transaction , Application Program

Multiple Choice Multiple Answer Question There are two kinds of tables Correct Answer

base tables , views

Your Answer

base tables , views

Select The Blank Question

Entities are represented in ________in E-R diagram

Correct Answer

Rectangular box

Your Answer

oval box

True/False Question

A relational model relates records by the value that they contain.

Correct Answer

True

Your Answer

True

Match The Following Question

Correct Answer

Your Answer

Data files

Stores the database itself

Stores the database itself

Person who design and implement Database management system modules Person who design and implement tools Person responsible for running and maintenance of Hardware and Software in a Database

Database Management system designers and implementers

Database Management system designers and implementers

Tool developers

Tool developers

Operators and maintenance personal

Operators and maintenance personal

True/False Question

The database is partitioned into some number of fixed length block called as pages.

Correct Answer

True

Your Answer

True

Multiple Choice Multiple Answer

Page 2 of 34

SCDL – 2nd Semester – Database Management Systems Question

The different types of database users

Correct Answer

Security officers , Database administrators , Network administrators

Your Answer

Security officers , Database administrators , Database operators

Select The Blank Question

________are used to find and steal user names and passwords

Correct Answer

Packet sniffers

Your Answer

Network sniffers

True/False Question Correct Answer

If company policy does not support more than 100 employees in a department . So Dept-Emp relationship is "one to many relationship" True

Your Answer

True

Multiple Choice Single Answer Question Write output of following example SELECT SUBSTR('SECURE',3,4) FROM DUAL Correct Answer

CURE

Your Answer

CURE

Multiple Choice Single Answer Question If each role granted to a user is either Correct Answer

enabled or disabled

Your Answer

enabled only

Select The Blank Question Correct Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions

Your Answer

Data

Multiple Choice Single Answer Question Write a function which returns number of rows in the tables including duplicates Correct Answer

count(*)

Page 3 of 34

SCDL – 2nd Semester – Database Management Systems Your Answer

count(*)

Select The Blank Question

The query language defined by Donald Chamberlain is called as________

Correct Answer

Structured English Query Language

Your Answer

System R

Select The Blank Question Correct Answer

A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization Threat

Your Answer

Threat

Multiple Choice Multiple Answer Question Some clauses of Revoke command are as follows Correct Answer

FROM , ON

Your Answer

FROM , ON

True/False Question

SQL is low level language

Correct Answer

False

Your Answer

True

Multiple Choice Single Answer Question A person who has control over system is called as Correct Answer

Database administrator

Your Answer

Database administrator

Multiple Choice Multiple Answer Question Major difficulties in referring to the log is : Correct Answer Your Answer

Time Consuming , Redoing transactions which have already written their updates to the database Time Consuming , Redoing transactions which have already written their updates to the database , Rechecking the log time and again

Multiple Choice Multiple Answer

Page 4 of 34

SCDL – 2nd Semester – Database Management Systems Question

Types of indexes are

Correct Answer

Unique indexes , multiple inedexes , Composite indexes

Your Answer

Composite indexes , Unique indexes

Multiple Choice Multiple Answer Question Different E-R modelling styles are Correct Answer

Crow's foot , Rein 85 , IDEFIX

Your Answer

Crow's foot , Rein 85 , IDEFIX , Functions

Multiple Choice Multiple Answer Question Reasons of creation of views Correct Answer

When data security is required , When data redundancy is to be kept to minimum.

Your Answer

When data security is required , When data redundancy is to be kept to minimum.

True/False Question

You cannot grant or revoke system privileges to users and roles.

Correct Answer

False

Your Answer

False

Multiple Choice Single Answer Question A collection of pages is called as : Correct Answer

Page table

Your Answer

Index table

True/False Question

The most widely used conceptual model is entity relationship model

Correct Answer

True

Your Answer

True

True/False Question

A revoke command is used to take away a privilege that was granted

Correct Answer

True

Page 5 of 34

SCDL – 2nd Semester – Database Management Systems Your Answer

True

Multiple Choice Single Answer Question Write command to grant UPDATE authority on catalog table to user John Correct Answer

GRANT UPDATE ON CATALOG TO JOHN

Your Answer

GRANT UPDATE ON CATALOG TO JOHN

Multiple Choice Multiple Answer Question Block movements between disk and main memory are initiated through 2 operations namely: Correct Answer Input , Output Your Answer

Select The Blank Question

Input , Output

Correct Answer

________is protection of database against intentional and unintentional threats that may be computer-based or non-computer-based Security

Your Answer

Security

Match The Following Question

Correct Answer

Your Answer

E-R diagram

Similar to class diagram

Use case

Interaction between users and system Flow of tasks between components System components and their connection

System components and their connection Interaction between users and system Flow of tasks between components

Activity diagrams Implementation diagram

Interaction between hardware and software

Select The Blank Question

Database design model helps in improving________

Correct Answer

maintainability

Your Answer

data design

Multiple Choice Multiple Answer Question Security considerations apply to Correct Answer

data, database , dbms , users and applications

Page 6 of 34

SCDL – 2nd Semester – Database Management Systems Your Answer

Select The Blank Question

data, database , users and applications , variant

Correct Answer

________published the paper "Relational Model of Data for Large Shared Data Banks " F.Codd

Your Answer

Leon

True/False Question Correct Answer

Transactions are not allowed to perform any update actions while checkpoint is in progress. True

Your Answer

False

Select The Blank Question Correct Answer

Data types CHARACTER AND CHARACTER VARYING are known collectively as ________ Character string data types

Your Answer

Character data types

Multiple Choice Multiple Answer Question Which of the following are functions of DBA Correct Answer Your Answer

Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Multiple Choice Single Answer Question (%) stands for Correct Answer

Sequence of n characters in character string

Your Answer

Single character in character string

Multiple Choice Single Answer Question A database must be prtotected against Correct Answer

viruses

Your Answer

modification

Select The Blank

Page 7 of 34

SCDL – 2nd Semester – Database Management Systems Question Correct Answer

In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language ANSI American national std institute

Your Answer

ANSI American national std institute

Multiple Choice Single Answer Question Write a syntax of SELECT which shows unique records only. Correct Answer

SELECT DISTINCT * FROM

Your Answer

SELECT DISTINCT * FROM

Select The Blank Question

Enitity name is written in ________in E-R diagram

Correct Answer

upper case

Your Answer

underline

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 8 of 34

SCDL – 2nd Semester – Database Management Systems Your Answer

Role A cannot be granted to role B

Multiple Choice Multiple Answer Question Some clauses of Revoke command are as follows Correct Answer

FROM , ON

Your Answer

FROM , ON

True/False Question

Log contains partial record of all database activity.

Correct Answer

False

Your Answer

False

True/False Question

Security is important issue in database management .

Correct Answer

True

Your Answer

True

Select The Blank Question In________there is no security of data Correct Answer

DBMS

Your Answer

DBMS

Select The Blank Question ________is a process by which user's identity is checked Correct Answer

Authentication

Your Answer

Authentication

True/False Question

A revoke command is used to take away a privilege that was granted

Correct Answer

True

Your Answer

True

Multiple Choice Single Answer Question When two entities are associated then the relationship exists is called : Correct Answer

binary relationship

Page 9 of 34

SCDL – 2nd Semester – Database Management Systems Match the following 1. ADD_MONTH(D,N)

1. RETURNS DATE AFTER ADDING THE NUMBER OF MONTHS SPECIFIED .

2. NEXT_DAY(DATE,CHAR)

2. returns year of the date which is passed.

3. LAST_DAY(D)

3. returns number of months between d1 and d2.

4. MONTHS_BETWEEN(D1,D2)

4. RETURNS DATE AFTER ADDING THE NUMBER OF MONTHS SPECIFIED . 5. returns the date offirst weekday named by charthat is after the date named by date. 6. returns no of days between months d1 and d2.

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 10 of 34

SCDL – 2nd Semester – Database Management Systems

Multiple Choice Multiple Answer Question Security considerations apply to Correct Answer

users and applications , data, database , dbms

Your Answer

data, database , dbms , users and applications

Select The Blank Question Correct Answer

________is the process by which the user's access to physical data in the application is limited, based on his privileges. Access control

Your Answer

Access control

Multiple Choice Multiple Answer Question Advantages of Database Management System Correct Answer

Reduced redundancy , Sharing of data , Security

Your Answer

Reduced redundancy , Sharing of data , Security , Work Space required for execution and storage is less

Multiple Choice Multiple Answer Question Which of the following is a database privilege Correct Answer Your Answer

The right to connect the database , The right to create table , The right to select rows from another user's table The right to connect the database , The right to create table , System programming

True/False Question

You cannot grant or revoke system privileges to users and roles.

Correct Answer

False

Your Answer

False

True/False Question

Centralised Database Management cannot support multiple users.

Correct Answer

False

Your Answer

False

Match The Following Question

Correct Answer

Menu driven interface

Stand alone user

Query language interface

Casual user

Page 11 of 34

Your Answer

DBA

SCDL – 2nd Semester – Database Management Systems

Multiple Choice Multiple Answer Question Some examples of select command are as following using emp_table Correct Answer Your Answer

select * from emp; , select empno,name from emp , select empno,name from emp where salary in(9000,10000); select * from emp; , select empno,name from emp where salary in(9000,10000);

Multiple Choice Multiple Answer Question Strong entities are also called as Correct Answer

dominant , Parent , owner

Your Answer

dominant , owner

Multiple Choice Multiple Answer Question Specify any three string functions used in SQL Correct Answer

lower(char) , initcap(char) , upper(char)

Your Answer

lower(char) , upper(char) , stringlength(char)

Multiple Choice Single Answer Question What will you get when Data items are grouped together. Correct Answer

Entity

Your Answer

Entity

Select The Blank Question

A________ mechanism that can be used to provide authorization

Correct Answer

role

Your Answer

role

Multiple Choice Multiple Answer Question Which of the following is a database privilege Correct Answer Your Answer

The right to connect the database , The right to create table , The right to select rows from another user's table The right to connect the database , The right to create table , The right to select rows from another user's table , System programming

Multiple Choice Single Answer Question In order to implement checkpoint the log is checked :

Page 12 of 34

SCDL – 2nd Semester – Database Management Systems Correct Answer

Backwards

Your Answer

Backwards

Multiple Choice Single Answer Question ( _ ) stands for Correct Answer

any single character in character string

Your Answer

any single character in character string

True/False Question

A role provides authorisation.

Correct Answer

True

Your Answer

True

Select The Blank Question

Entities are represented in ________in E-R diagram

Correct Answer

Rectangular box

Your Answer

square box

True/False Question Correct Answer

The SSL protocol developed by microsoft corporation, is an industry accepted standard for network transport layer security False

Your Answer

True

Multiple Choice Single Answer Question One method of protecting the privacy and integrity of a system is to place a firewall between internet and Correct Answer Public network Your Answer

intranet

True/False Question

SQL is low level language

Correct Answer

False

Your Answer

True

Page 13 of 34

SCDL – 2nd Semester – Database Management Systems True/False Question Correct Answer

To update city_name to bombay following command is used. UPDATE EMP_TABLE SET CITY='BOMBAY'; True

Your Answer

True

Select The Blank Question

________are binary computer representations of stored logical entities

Correct Answer

Data

Your Answer

Program

Multiple Choice Single Answer Question Degree of relationship indicates no of associated Correct Answer

Entities

Your Answer

Entities

Multiple Choice Single Answer Question To enter new field city in the table 'branch_master' following command is used Correct Answer

alter table branch_master add(city varchar2(25))

Your Answer

alter table branch_master add(city varchar2(25))

Multiple Choice Single Answer Question The set of all relationships of the same type called as Correct Answer

Relationship set

Your Answer

Relationship set

True/False Question Correct Answer

In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. False

Your Answer

False

Select The Blank Question Correct Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions

Page 14 of 34

SCDL – 2nd Semester – Database Management Systems Your Answer

functions

True/False Question

A role provides authorisation.

Correct Answer

True

Your Answer

True

Multiple Choice Single Answer Question Data can be inserted by row in a table following command can be used. Correct Answer

INSERT

Your Answer

INSERT

Select The Blank Question

________is a process by which the user's privileges are ascertained

Correct Answer

Authorisation

Your Answer

Authentication

True/False Question Correct Answer

Logical 'OR' operator returns true if both component conditions are true otherwise returns false False

Your Answer

False

Select The Blank Question Correct Answer

The information collected in requirement analysis stage is ________for information modeling input

Your Answer

input

Multiple Choice Multiple Answer Question Attributes are classified as Correct Answer

Simple , Composite , Multivalued

Your Answer

Simple , Composite , Multivalued

Multiple Choice Single Answer

Page 15 of 34

SCDL – 2nd Semester – Database Management Systems Question Correct Answer

In three tier architecture, the layer which provides user interface and interacts with the user is : Presentation layer

Your Answer

Presentation layer

Match The Following Question

Correct Answer

Your Answer

Authorisation

permission given to user

Provide authority

Previlege

Permission for accessing objects

Permission for accessing objects

Role

Provide authority

permission given to user

Integrity

hallmark of data security

hallmark of data security

Multiple Choice Single Answer Question Overheads can be reduced by is introducing : Correct Answer

checkpoints

Your Answer

checkpoints

Multiple Choice Multiple Answer Question What are secured using authorisation and access control. Correct Answer

The intranet , local clients , opearators

Your Answer

The intranet , the internet

Multiple Choice Single Answer Question Which type of attribute holds single value for single entity? Correct Answer

single valued attribute

Your Answer

simple attribute

Select The Blank Question

________regulates all user access to named objects through privileges

Correct Answer

Discretionary access control

Your Answer

System access control

Multiple Choice Multiple Answer

Page 16 of 34

SCDL – 2nd Semester – Database Management Systems Question

Which of the following are object oriented features

Correct Answer

Inheritance , Abstraction

Your Answer

Inheritance , Polymerisation

Multiple Choice Multiple Answer Question Three levels of database service Correct Answer

External level , Conceptual level , Physical level

Your Answer

External level , Conceptual level , Physical level

Select The Blank Question

The most widely used conceptual model is________

Correct Answer

E-R model

Your Answer

E-R model

Select The Blank Question

A________ mechanism that can be used to provide authorization

Correct Answer

role

Your Answer

role

Select The Blank Question Correct Answer

A________is a situation,event or Personnel that will adversely affect the database security and the smooth functioning of organization Threat

Your Answer

Threat

True/False Question

Using database redumdancy can be removed

Correct Answer

True

Your Answer

True

Multiple Choice Single Answer Question What is alternative name for functions Correct Answer

methods

Page 17 of 34

SCDL – 2nd Semester – Database Management Systems Your Answer

programs

Multiple Choice Multiple Answer Question Different syntaxes used for update command in SQL are as follows. Correct Answer

Your Answer

update set = , update set = where update set = where

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 18 of 34

SCDL – 2nd Semester – Database Management Systems

Select The Blank Question

In________there is no security of data

Correct Answer

DBMS

Your Answer

DBMS

Multiple Choice Multiple Answer Question A Database Management System has several subsystems Correct Answer Your Answer

Select The Blank Question

Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem

Correct Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions

Your Answer

functions

Select The Blank Question Correct Answer

In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language ANSI American national std institute

Your Answer

ANSI American national std institute

Multiple Choice Multiple Answer Question The different types of database users Correct Answer

Security officers , Database administrators , Network administrators

Your Answer

Database administrators , Database operators

Select The Blank Question

Each attribute is associted with set of values called as________

Correct Answer

Domain

Your Answer

Relation

Multiple Choice Single Answer Question Access to a database can be controlled using Correct Answer

Access Privilages

Your Answer

Access control

Page 19 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS True/False Question Correct Answer

In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. False

Your Answer

False

Multiple Choice Multiple Answer Question

The functions of Database adminstrator are

Correct Answer Your Answer

Multiple Choice Single Answer Question

Authorization for data access , Schema definition , Maintenance of Database Authorization for data access , Maintenance of Database

Correct Answer

What expresses the specific number of entity occurances associated with one occurance of related entity? Cardinality

Your Answer

Cardinality

Multiple Choice Multiple Answer Question

Write examples of dbms

Correct Answer

Foxbase , foxpro

Your Answer

Foxbase , foxpro

Select The Blank

Page 20 of 34

SCDL – 2nd Semester – Database Management Systems Question Correct Answer

________is a process by which the user's privileges are ascertained Authorisation

Your Answer

Authorisation

Multiple Choice Single Answer Question Correct Answer

What operation is used to protect data from corruption and deletion . Data integrity

Your Answer

Data integrity

Multiple Choice Multiple Answer Question Correct Answer

What can be used to manage databases data integrity rule Integrity constraints , Database triggers

Your Answer

Integrity constraints , Database triggers

Multiple Choice Single Answer Question

The set of all entities of the same type called as

Correct Answer

entity set

Your Answer

entity set

Select The Blank Question

Enitity name is written in ________in E-R diagram

Correct Answer

upper case

Your Answer

upper case

Select The Blank Question Correct Answer

The first commercial RDBMS was ________from Relational Software Inc. ORACLE

Your Answer

ORACLE

Select The Blank Question Correct Answer

UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object functions

Your Answer

functions

Page 21 of 34

SCDL – 2nd Semester – Database Management Systems

True/False Question Correct Answer

You cannot grant or revoke system privileges to users and roles. False

Your Answer

True

Multiple Choice Single Answer Question Correct Answer

Write SQL statement, which will show contents of table book, where 2nd character of bookname is 'm' select * from book where bookname like '_m%'

Your Answer

select * from book where bookname like '_m%'

Select The Blank Question

In________there is no security of data

Correct Answer

DBMS

Your Answer

DBMS

Select The Blank Question

File is collection of ________

Correct Answer

records

Your Answer

records

Multiple Choice Single Answer Question

The set of all relationships of the same type called as

Correct Answer

Relationship set

Your Answer

Relationship set

Select The Blank Question Correct Answer

________are collection of instructions for manipulating data program

Your Answer

program

Multiple Choice Multiple Answer Question

Which of the following are valid SQL commands.

Correct Answer

ALTER , UPDATE

Page 22 of 34

SCDL – 2nd Semester – Database Management Systems Your Answer

ALTER , UPDATE

Multiple Choice Single Answer Question

DDL stands for

Correct Answer

Data definition language

Your Answer

Data definition language

Multiple Choice Single Answer Question

A person who has control over system is called as

Correct Answer

Database administrator

Your Answer

Database administrator

Multiple Choice Multiple Answer Question Correct Answer

What are secured using authorisation and access control. The intranet , local clients , opearators

Your Answer

The intranet , local clients , opearators

Multiple Choice Single Answer Question

What is nothing but refined data

Correct Answer

Information

Your Answer

Information

True/False Question Correct Answer

A database may include varieties of data that are interrelated in many ways. True

Your Answer

True

Multiple Choice Multiple Answer Question

Which of the following are functions of DBA

Correct Answer Your Answer

Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support Installing and upgrading the dbms , Enrolling users and maintaining security , contacting dbms vendor for technical support

Select The Blank

Page 23 of 34

SCDL – 2nd Semester – Database Management Systems Question Correct Answer

SQL as a language is________of the way it is implemented internally. independent

Your Answer

independent

Multiple Choice Multiple Answer Question

Attributes are classified as

Correct Answer

Simple , Composite , Multivalued

Your Answer

Simple , Composite , Multivalued

Match The Following Question select * from where

Correct Answer Views all columns in sorting ording by specified column_name

Your Answer Views all columns in sorting ording by specified column_name

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 24 of 34

SCDL – 2nd Semester – Database Management Systems Question

Functions at the server end are

Correct Answer Query , Transaction Your Answer

Query , Transaction

Select The Blank Question Data types BIT and BIT VARYING are known as ________ Correct Answer Bit string data types Your Answer

Bit string data types

True/False Question

Logical data independence is the capacity to change conceptual schema without having to change external schema. Correct Answer True Your Answer

True

Multiple Choice Single Answer Question The set of all relationships of the same type called as Correct Answer Relationship set Your Answer

Relationship set

Match The Following Question

Correct Answer

Your Answer

E-R diagram

Similar to class diagram

Similar to class diagram

Use case

Interaction between users and Interaction between users and system system Flow of tasks between components Flow of tasks between components

Activity diagrams Implementation diagram

System components and their connection

System components and their connection

Multiple Choice Single Answer Question Which of the following is high level data model Correct Answer Entity-Relationship model Your Answer

Entity-Relationship model

Multiple Choice Single Answer Question In an Entity relationship diagram, what is used to link attributes to entity sets and entity sets to relationships? Correct Answer Line

Page 25 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 26 of 34

SCDL – 2nd Semester – Database Management Systems

Select The Blank Question In________there is no security of data Correct Answer DBMS Your Answer

DBMS

Multiple Choice Multiple Answer Question A Database Management System has several subsystems Correct Answer Transaction Manager Subsystem , Query Manager Subsystem , Storage Manager Subsystem Your Answer Transaction Manager Subsystem , Data Manager Subsystem , Query Manager Subsystem Select The Blank Question UML additionaly provide set of ________that can be invoked to compute values on the basis of attributes of the object Correct Answer functions Your Answer

functions

Select The Blank Question In 1978 the________approved the SQL database language project which led to the formulation of the initial SQL standard language Correct Answer ANSI American national std institute Your Answer

ANSI American national std institute

Multiple Choice Multiple Answer Question The different types of database users Correct Answer Security officers , Database administrators , Network administrators Your Answer

Database administrators , Database operators

Select The Blank Question Each attribute is associted with set of values called as________ Correct Answer Domain Your Answer

Relation

Multiple Choice Single Answer Question Access to a database can be controlled using Correct Answer Access Privilages Your Answer

Access control

Page 27 of 34

SCDL – 2nd Semester – Database Management Systems

Page 28 of 34

SCDL – 2nd Semester – Database Management Systems LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 29 of 34

SCDL – 2nd Semester – Database Management Systems Database design

True/False Question

conversion into computer usable must know form entities,relation,attributes

Codd developed E-R model

Correct Answer False Your Answer

False

Select The Blank Question ________means data is protected from deletion and corruption, both while it resides within database Correct Answer Data integrity Your Answer

Data integrity

Multiple Choice Single Answer Question Write output of following example SELECT LOWER('JOHN') FROM DUAL; Correct Answer john Your Answer

john

Multiple Choice Multiple Answer Question The levels of abstraction of data are Correct Answer Physical level , Logical level , View level Your Answer

Physical level , Logical level

Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer

Data integrity

Select The Blank Question ________is the process by which the user's access to physical data in the application is limited, based on his privileges. Correct Answer Access control Your Answer

Access control

Multiple Choice Single Answer Question An example of non-volatile storage is : Correct Answer Magnetic Tapes

Page 30 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS

Page 31 of 34

SCDL – 2nd Semester – Database Management Systems

True/False Question

In Database management system, protection includes against hardware and Software malfunctions and not against unauthorized access. Correct Answer False Your Answer

False

Multiple Choice Multiple Answer Question The functions of Database adminstrator are Correct Answer Authorization for data access , Schema definition , Maintenance of Database Your Answer

Authorization for data access , Maintenance of Database

Multiple Choice Single Answer Question What expresses the specific number of entity occurances associated with one occurance of related entity? Correct Answer Cardinality Your Answer

Cardinality

Multiple Choice Multiple Answer Question Write examples of dbms Correct Answer Foxbase , foxpro Your Answer

Foxbase , foxpro

Select The Blank Question ________is a process by which the user's privileges are ascertained Correct Answer Authorisation Your Answer

Authorisation

Multiple Choice Single Answer Question What operation is used to protect data from corruption and deletion . Correct Answer Data integrity Your Answer

Data integrity

Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Integrity constraints , Database triggers Your Answer

Integrity constraints , Database triggers

Page 32 of 34

SCDL – 2nd Semester – Database Management Systems

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question The different types of database users Correct Answer

Network administrators , Security officers , Database administrators

Your Answer

Network administrators , Security officers , Database administrators

Multiple Choice Multiple Answer Question The front end of database consists of tools such as Correct Answer

Forms , Query evaluators , Graphical user interfaces

Your Answer

Forms , Query evaluators , Graphical user interfaces

True/False Question Correct Answer

The determination of information requirements for an application doesnot play a crucial role in the selection of an actual database structural data model. False

Your Answer

False

Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer

Integrity constraints , Database triggers

Your Answer

Integrity constraints , Database triggers

Match The Following Question

Correct Answer

Page 33 of 34

Your Answer

SCDL – 2nd Semester – Database Management Systems select * from order by

Views all columns in sorting ording by specified column_name

Views all columns in sorting ording by specified column_name

LIST OF ATTEMPTED QUESTIONS AND ANSWERS Multiple Choice Multiple Answer Question The different types of database users Correct Answer Network administrators , Security officers , Database administrators Your Answer

Network administrators , Security officers , Database administrators

Multiple Choice Multiple Answer Question The front end of database consists of tools such as Correct Answer Forms , Query evaluators , Graphical user interfaces Your Answer

Forms , Query evaluators , Graphical user interfaces

True/False Question

The determination of information requirements for an application doesnot play a crucial role in the selection of an actual database structural data model. Correct Answer False Your Answer

False

Multiple Choice Multiple Answer Question What can be used to manage databases data integrity rule Correct Answer Integrity constraints , Database triggers Your Answer

Integrity constraints , Database triggers

Page 34 of 34

Related Documents

Scdl - Databse Management
October 2019 13
Financial Management - Scdl
November 2019 25
Scdl Management Accounting
December 2019 29
Management Accounting - Scdl
November 2019 21
Scdl
April 2020 8