List of Attempted Questions AND Answers: Multiple Choice Multiple Answer

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

LIST OF

ATTEMPTED
QUESTIONS  
AND
ANSWERS
   
 Multiple Choice Multiple Answer
  Question   The front end of database consists of tools such as

  Correct Forms , Query evaluators , Graphical user


Answer   interfaces
  Your Answer   Forms , Query evaluators , Graphical user
interfaces
 
 Multiple Choice Multiple Answer
  Question   SSL protocol provides

  Correct authorisation , data encryption , data integrity


Answer  
  Your Answer   authorisation , data encryption , data integrity

 
 Multiple Choice Single Answer
  Question   Write output of following example SELECT
lower('JOHN MARTIN') FROM DUAL;
  Correct john martin
Answer  
  Your Answer   john martin

 
 True/False
  Question   Database design model help in improving
maintainability
  Correct True
Answer  
  Your Answer   True

 
 Select The Blank
  Question   ________is the process by which the user's access
to physical data in the application is limited, based
on his privileges.
  Correct Access control
Answer  
  Your Answer   Access control

 
 Match The Following
Question Correct Answer Your Answer

long Used to store arrays Used to store arrays of


of binary data in binary data in ASCII
ASCII format format
CHAR(SIZE) To store character To store character
strings values of fixed strings values of fixed
length length
VARCHAR(SIZE) To stroe variable To stroe variable
length alphanumeric length alphanumeric
data. data.
date This data type is used This data type is used
to represent date and to represent date and
type type
 
 Select The Blank
  Question   SQL as a language is________of the way it is
implemented internally.
  Correct independent
Answer  
  Your Answer   independent

 
 Select The Blank
  Question   Each attribute is associted with set of values called
as________
  Correct Domain
Answer  
  Your Answer   Domain

 
 Multiple Choice Single Answer
  Question   A person who has control over system is called as

  Correct Database administrator


Answer  
  Your Answer   Database administrator

 
 Select The Blank
  Question   ________are used to find and steal user names
and passwords
  Correct Packet sniffers
Answer  
  Your Answer   Packet sniffers

 
 Multiple Choice Multiple Answer
  Question   The different types of database users

  Correct Security officers , Database administrators ,


Answer   Network administrators
  Your Answer   Security officers , Database administrators ,
Network administrators
 
 Multiple Choice Single Answer
  Question   Write output of following example SELECT
LOWER('JOHN') FROM DUAL;
  Correct john
Answer  
  Your Answer   john

 
 True/False
  Question   A database can avoid data inconsistancy

  Correct True
Answer  
  Your Answer   True

 
 Multiple Choice Single Answer
  Question   Write output of following example SELECT
initcap('JOHN MARTIN') FROM DUAL;
  Correct John Martin
Answer  
  Your Answer   John Martin

 
 True/False
  Question   The embedded DML precompiler converts DML
statements to normal procedure calls.
  Correct True
Answer  
  Your Answer   True

 
 True/False
  Question   Availability is often thoutht of as continuity of
service, ensuring that database is available 24
hours a day, 7 days a week
  Correct True
Answer  
  Your Answer   True

 
 True/False
  Question   A database may include varieties of data that are
interrelated in many ways.
  Correct True
Answer  
  Your Answer   True

 
 True/False
  Question   A Database management sytem needs to interface
with communication software.
  Correct True
Answer  
  Your Answer   True

 
 Select The Blank
  Question   ________are collection of instructions for
manipulating data
  Correct program
Answer  
  Your Answer   program

 
 Multiple Choice Multiple Answer
  Question   Which of the following are object oriented features

  Correct Inheritance , Abstraction


Answer  
  Your Answer   Inheritance , Abstraction , Polymerisation

 
 Select The Blank
  Question   ________provides a graphical means of modeling
various components of software system
  Correct UML
Answer  
  Your Answer   UML

 
 Multiple Choice Multiple Answer
  Question   The ICAM studies created lot of graphical methods
for defining
  Correct Functions , Data structures
Answer  
  Your Answer   Functions , Combinations , Data structures

 
 Select The Blank
  Question   All SQL operations are performed at a
________level
  Correct Set
Answer  
  Your Answer   Relation

 
 Select The Blank
  Question   ________regulates all user access to named
objects through privileges
  Correct Discretionary access control
Answer  
  Your Answer   System access control

 
 Multiple Choice Multiple Answer
  Question   What can be used to manage databases data
integrity rule
  Correct Integrity constraints , Database triggers
Answer  
  Your Answer   Integrity constraints , Database triggers

 
 True/False
  Question   The Database administrator cannot grant or revoke
privileges to users.
  Correct False
Answer  
  Your Answer   False

 
 Multiple Choice Single Answer
  Question   Which of the following term means the ability to
represent a model using esily understood
diagrammatic notation
  Correct Diagrammatic representation
Answer  
  Your Answer   Diagrammatic representation

 
 Multiple Choice Single Answer
  Question   What proides system developers and users with
confidence that data will not be compromised in the
internet.
  Correct SSL
Answer  
  Your Answer   SSL

 
 Multiple Choice Single Answer
  Question   Character strings are written as a sequence of
characters in
  Correct Single quotes
Answer  
  Your Answer   Single quotes

 
 Multiple Choice Multiple Answer
  Question   Write names of high level languages

  Correct COBOL , Pascal , Assembly


Answer  
  Your Answer   COBOL , Pascal

 
 True/False
  Question   structural constraints are specified to force the
placement of information into structures
  Correct True
Answer  
  Your Answer   True

 
 Multiple Choice Multiple Answer
  Question   The back end manages

  Correct Access Structures , Concurrency control


Answer  
  Your Answer   Access Structures , Concurrency control

 
 Multiple Choice Multiple Answer
  Question   The levels of abstraction of data are

  Correct Physical level , Logical level , View level


Answer  
  Your Answer   Physical level , Logical level , View level

 
 True/False
  Question   If GRANT include the WITH GRANT OPTION, the
grantee can further grant object privilege to other
users.
  Correct True
Answer  
  Your Answer   True

 
 Multiple Choice Multiple Answer
  Question   Which of the following are functions of DBA

  Correct Installing and upgrading the dbms , Enrolling users


Answer   and maintaining security , contacting dbms vendor
for technical support
  Your Answer   Installing and upgrading the dbms , Enrolling users
and maintaining security , contacting dbms vendor
for technical support
 
 Multiple Choice Single Answer
  Question   In order to implement checkpoint the log is checked
:
  Correct Backwards
Answer  
  Your Answer   Backwards

 
 Multiple Choice Single Answer
  Question   The compiler which translates DML statements in
Query language into low level instructions is called
-
  Correct DML compiler
Answer  
  Your Answer   DML Precompiler

 
 Multiple Choice Single Answer
  Question   Write a command to remove update authority on
price and year columns of the catalog tablse from
user "Alexis"
  Correct REVOKE UPDATE(PRICE,YEAR) ON CATALOG
Answer   FROM ALEXIS
  Your Answer   REVOKE UPDATE(PRICE,YEAR) ON CATALOG
FROM ALEXIS
 
 Select The Blank
  Question   Structctural validity in data modeling means
________
  Correct consistency
Answer  
  Your Answer   perfectancy

 
 Multiple Choice Single Answer
  Question   Number of operations take place to convert raw
data into information. What these no of operations
called as
  Correct Data processing
Answer  
  Your Answer   Data processing

 
 True/False
  Question   Availability is often thoutht of as continuity of
service, ensuring that database is available 24
hours a day, 7 days a week
  Correct True
Answer  
  Your Answer   True

 
 Match The Following
Question Correct Answer Your Answer

Database design real world entities describe record


designs
External level Highest level Highest level

Conceptual database independent of describe file structures


design implementation
design
Physical database describe storage describe storage
design structure structure
 
 Select The Blank
  Question   ________is a process by which the user's
privileges are ascertained
  Correct Authorisation
Answer  
  Your Answer   Authorisation

 
 Multiple Choice Multiple Answer
  Question   Some clauses of GRANT command are as follows

  Correct ALL , ON , PUBLIC


Answer  
  Your Answer   ALL , ON , PUBLIC

 
 Multiple Choice Single Answer
  Question   Write command "to grant update authority on price
column of catalogue to user "Smita"
  Correct GRANT UPDATE(PRICE) ON CATALOGUE TO
Answer   SMITA
  Your Answer   GRANT UPDATE(PRICE) ON CATALOGUE TO
SMITA
 
 Multiple Choice Multiple Answer
  Question   Three levels of database service

  Correct External level , Conceptual level , Physical level


Answer  
  Your Answer   External level , Conceptual level , Physical level

 
 Select The Blank
  Question   A________is a situation,event or Personnel that
will adversely affect the database security and the
smooth functioning of organization
  Correct Threat
Answer  
  Your Answer   Managemet

You might also like