Database Theory Level-3

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

I.

Choose the Best Answer from the given Alternatives:


1. Which one of the ff should not be consider when a database design?
A. User needs and requirement
B. The designer interest
C. The complexity and simplicity of the work
D. Feasibility of the data base system.
2. You run as select statement and multiple duplication of what key word can you use to retrieve
only the non duplicate records?

A. Duplicated
B. Individual
C. Separate
D. Distinct
3. Following is a simple SQL quiz that beginners may find interesting. Study the 3 tables below,
answer the following questions.

What is the result of: "Select Employee.EmpID, Employee.FirstName,


HoursWorked.NormalHours *2 from Employee inner join HoursWorked on
Employee.EmpID = HoursWorked.EmpID where Employee.EmpID = 10001"
A. 10001 John 40
B. 10001 John 80
C. 10001 John 42
D. 10001 John 5
E. 10001 80
4. Which of the ff is multi-valued attribute
A. Sex
B. emp age
C. Id number
D. address
5. Publisher and titles table relation will be.

F. One---to---one relation
G. One---to---many relation
H. Many---to---many relation
I. Has no relation

6. Which of the ff records would be addressed in creating query having the criteria between 1/1/99
and 31/12/99?
A. Record between the actual 1/1/99 & 31/12/99 includes 1/1/99 & 31/12/99
B. Record between the actual 1/1/99 & 31/12/99 Excluding 1/1/99 & 31/12/99
C. Record which data equal 1/1/99 & 31/12/99
D. All data excepts 1/1/99 & 31/12/99
7. SQL server system database component
A. Master database
B. Model database
C. Conventional database
D. Tmpdb
8. Which of the following is data type?

A. Ole-Object
B. Input mask
C. Index
D. Caption

9. Which of the following is a database management system?

A.C++
B. Oracle
C. Adobe Reader
D. Dreamweaver

10. Which one of the following is not necessary information to backup database type?
A. Name of the database to back-up
B. Back-up devices where the database backup will be written
C. Whether you are generated operate the backup task
D. Model of the database
11. Which of the following is memo data type?

A. N12
B. &123
C. ZYX
D. 01-march -05

12. In which database model is information organized in tables.

A. Relational Database
B. Object Objected
C. Network
D. Hierarchical
13. Revoking Involves
A. Removing a previously granted permission for user account group in a database
B. Removing a previously denied permission for user account group in a database
C. Removing a previously granted or denied permission from a role or group in database
D. Removing User from a role or group
14. What is an index?
A. An index is a special way to join 2 or more tables
B. An index is the same as alias
C. An index is a database table attribute, which speeds-up data search within a table
15. Which of the following is not true about primary key?
A. Primary key don’t allow null values
B. No two rows can have the same primary key values
C. A primary key values uniquely identified a values
D. All table must have a primary key

16. Which of the following is true?


A. TRUNCATE TABLE deletes table from a database
B. TRUNCATE TABLE has to be used along with a WHERE clause
C. TRUNCATE TABLE is identical to DELETE statement without WHERE clause and both
remove all rows in a table
17. Which of the following is not true about index
A. Provides fast access the data in the row of database
B. Enforces uniqueness on the row in table
C. Is applied only for char data type
D. The primary key of the table is automatically index
18. Which of the following is true about a view

A. It is a base table
B. It is derived attribute
C. It is apply a derived & a base table
D. It is stored procedures
19. Which of the following are central to normalization
A. Functional dependency
B. Foreign key
C. Query
D. Data type
20. Which of the following not modular programming benefits
A. Less code has to be written
B. allows many programmers to collaborate on the same application
C. Code is short, simple and easy to understand
D. different developers can’t work in parallel

21. Which statement should use to change record is that criteria


A. Update
B. Select
C. Insert
D. Query
22. Of the following entity integrity constraint except
A. Uniqueness
B. Primary key
C. Foreign key
D. Identity
23. You can not include sub queries in

A. Select
B. Insert
C. Update
D. Drop
24. Which of the following is TRUE about Primary Key?
A. A column that is defined as Primary Key value can be same value more than once
B. A column that is defined as Primary Key cannot contain NULL value
C. Primary key should be long type only

25. Which type of Join should you use .If you want to return only matches?

A. Inner Join
B. Left Outer join
C. Right outer join
D. Full join
26. What does the following SQL command output SELECT empname from emp where empname
like 'S---';
A. This displays all empname whose empname is ending with "S"
B. This displays all empname whose empname is starting with "S"
C. This displays all empname whose empname is with four letter and ending with "S"
D. This displays all empname whose empname is with four letter and starting with “S"

27. One of the following is not barrier in communication?


A. Understanding each other
B. Frequently q differences & poor expressions
C. Poor listening & pre-mature evaluation
D. Emotionality
28. Task measurement & Evaluation are made except
A. After the task is accumulate
B. Before the task is identified
C. During the accomplishment of a task
D. After the plan of the task is completed
29. The requirements of identity property
A. It can be easily modified
B. It will enforce uniqueness
C. Used as primary key
D. It is managed its values by the server
30. Which of the following terms reforms to the degree to which systems are accurate, correct &
consistent?

A. Data Security
B. Data Manipulation
C. Data Independence
D. Data Integrity
31.  A NULL value is treated as a blank or 0.      
A. True
B. False
32. Which of the following data types are used in SQL?
A. LONG
B. DATE
C. CHAR
D. All the above
33. authors  and the titles table relationship will be:
A. One---to---one relation
B. One---to---many relation
C. Many---to---many relation
D. Has no relation
34. Which of the following terms used to validate and improve a logical design so that it satisfies
certain constraints that avoid unnecessary duplication of data?
A. Data Security
B. Data Manipulation
C. Normalization
D. Data Integrity
35. When creating a referential constraint, which keyword(s) identifies the table and column in the
parent table?
A. Foreign key
B. References
C. Table Name
D. All
36. In order to remove the index created the SQL command used is:
A. DROP INDEX;
B. DELETE INDEX;
C. REMOVE INDEX;
D. CUT INDEX;
37. In which case we use nulls in tuple of relation or table?
A. value known to exist, but unavailable
B. reduce Waste of disk space
C. Avoid Insert anomalies
D. Disallowing generating Spurious
38. ------------------------ denote derived attributes.
A. Double ellipse
B. Dashed ellipse
C. Squared ellipse
D. Ellipse with attribute name underlined
39. What type of lock will deny users any access to a table?
A. EXPLICIT
B. IMPLICIT
C. EXCLUSIVE
D. SHARED
E. READ ONLY
40. What is a collection of all entities of particular entity type in the database?
A. Entity
B. Entity type
C. Entity set
D. Attributes
41. Which normal form applies if all the determinants are prime attribute or candidate keys?
A. First normal
B. Second normal
C. Third normal
D. Boyce-Codd Normal
42. Which one is not entity type?
A. Book
B. Gender
C. Order
D. Customer
43. Flow chart return show decision that must made represent by:
A. Diamond
B. Rectangle
C. Round
D. Circle
44. Which type of constraint by default requires that a column be both unique and not null?
A. Primary key
B. Unique
C. Not NULL
D. Check

II. Match Column “A” with Column “B”


A. 3. Minimizes data redundancy in a database K
1. Database Role 4. The column and combination of column
2. The process of validating that the user which values mach the primary key or
attempting to connect to database server is unique key in the same key or under table.o
authorized. C
5. The processes for protecting against the loss 14. The role and regulations on how to design
of data due to disk failure have maintaining and use a database H
a faulty. Copy of data on separate disk.
6. Data Manipulation Language(DML) S
7. Data Definition Language (DDL) I
8. Data Control Language (DCL) B
9. Specifies that the values in the specified B.
columns should be stored in ascending A. De-Normalization
order.L B. GRANT
C. Authentication
D. Questionnaires
PasswordDatabase Recovery
10. A state in which all foreign key values in a E. Mirroring
database are valid.M F. Procedures
G. Drop
10. Data collection Methodology .D. H. Master Data
11. A mechanism for restoring a database after a I. Normalization
J. Order by Last name ASC
failure F
K. Referential integrity
L. Public
12. Information about the properties of data.Q M. Foreign key
13. The protection of data against the N. Order by last name ASCE
deliverables or accidental access of O. Metadata
unauthorized persons.R P. Data security
Q. Updae

Match part II: Match Column “A” with Column “B”


1. Algorism N A. Third normal form
2. Set of all possible values for entities P B. SQL Union
3. Used to remove database & its object I C. Domains
4. Relationship type D. Where
5. Request for information from database M E. Second normal form
6. Remove transitive dependency F. Data types
7. Combine the results set G. Shadow paging 14
8. Used to specify table F H. Create database
9. A named column of the relation I. Drop command
10. You need to use when you create a J. Physical database
conventional database K. Entity type
11. Specify search condition L. Diamond
12. The set of allowable/possible values for M. Select statement
attributes N. A process or set of rules to be followed in
13. Constraints that specify the possible values calculations or other problem-solving
for each fields in a table C operations, especially by a computer.
14. A copy of write techniques G O. Create table
15. Remove partial dependency P. Attributes
Q. First normal form

Oral Question

1. How do you determining the scope of the database?


2. What could you do if the performance of the database is not good?
3. How could you protect your database failure?
4. What if the user /database user does not understand how to success and or unsatisfied with the
database?
5. What is the need of having documentation for the database?

You might also like