Last Edited Answer

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

1. Which one from the following is not Data Definition Language command?

A. Create B. Alter C. Insert D. Drop


Answer: C. Insert
2. Which one of from the following commonly used constraints available in SQL?

A. Not Null B. Grant C. Revoke D. Select


Answer: A.
3. Which one of from the following not categories of data integrity exist with each RDBMS?
A. Entity Integrity B. Domain Integrity C. Referential integrity D. User-Defined Integrity
E. None
Answer: E. None
4. Which of the following is the preferred way to recover a database after a transaction in
progress terminates abnormally?
A. Rollback B.Rollforward C. Switch to duplicate database D. Reprocess transactions
Answer: A. Rollback
5. Concurrency control is important for which of the following reasons?
A. To ensure data integrity when updates occur to the database in a multiuser environment
B. To ensure data integrity when updates occur to the database in a single-user environment
C. To ensure data integrity while reading data occurs to the database in a multiuser
environment
D. To ensure data integrity while reading data occurs to the database in a single-user
environment
Answer: A
6. Which of the following is the preferred way to recover a database after a system failure?
A. Rollback
B. Rollforward
C. Switch to duplicate database
D. Reprocess transactions
Answer: C
7. Which of the following data types is used to attach Microsoft Office files, graphics files,
sound files, and pdf files to a table?
A. OLE object
B. Hyperlink
C. Text
D. Memo
ANSWER: A

8. Which of the following views contains command buttons that execute operations on entire
databases?
A. Layout view B. Backstage view C. Design view D. Datasheet view
ANSWER: B
9. Which statement is wrong about PRIMARY KEY constraint in SQL?
A. The PRIMARY KEY uniquely identifies each record in a SQL database table
B. Primary key can be made based on multiple columns
C. Primary key must be made of any single columns
D. Primary keys must contain UNIQUE values.
Answer: C
Primary key of a table can be made based on single column or with combination of
multiple columns.
10. In a table, a column contains duplicate value, if you want to list all different value only, then
which SQL clause is used?
A. SQL DISTINCT
B. SQL UNIQUE
C. SQL BETWEEN
D. SQL Exists
Answer: A
DISTINCT keyword is used to fetch different (unique) value. UNIQUE keyword is known as
constraint that is applied to a table, e.g. if UNIQUE is applied to a column, that column will
allow only unique records to store and will not accept duplicate record.

11. In an E-R diagram attributes are represented by


A. Rectangle.
B. Square.
C. Ellipse.
D. Triangle.
Answer: C
12. The command to eliminate a table from a database in SQL is:
A. REMOVE TABLE CUSTOMER;
B. DROP TABLE CUSTOMER;
C. DELETE TABLE CUSTOMER;
D. UPDATE TABLE CUSTOMER;
E. None
Answer: B
13. Which of the following is the correct order of keywords for SQL SELECT statements?
A.SELECT, WHERE, FROM
B. FROM, WHERE, SELECT
C.WHERE, FROM, SELECT
D. SELECT, FROM, WHERE
Answer: D
14. Which one of the following sorts rows in SQL?
A. SORT BY
B. ALIGN BY
C. ORDER BY
D. GROUP BY
Answer: C
15. Which one of the following statements is false?
A. The data dictionary is normally maintained by the database administrator.
B. Data elements in the database can be modified by changing the data dictionary.
C. The data dictionary contains the name and description of each data element.
D. The data dictionary is a tool used exclusively by the database administrator.
Answer: B
16. The Cross-over cable is used to connect which one of the following device: -
A. Hub / Switch to System
B. Hub / Switch to Router
C. Hub / Switch to Server
D. Hub/Switch to Hub/Switch
Answer: D

17. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?
A. 192.168.168.129-190
B. 192.168.168.129-191
C. 192.168.168.128-190
D. 192.168.168.128-192

Answer: A
Explanation:
256 - 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191,
and the valid host range is the numbers in between, or 129-190.

18. Where is a hub specified in the OSI model?


A. Session layer
B. Physical layer
C. Data Link layer
D. Application layer
Answer: B
Explanation:
Hubs regenerate electrical signals, which are specified at the Physical layer.
19. Which of the following is private IP address?
A. 12.0.0.1
B. 168.172.19.39
C. 172.15.14.36
D. 192.168.24.43
Answer: Option D
Explanation:
Class A private address range is 10.0.0.0 through 10.255.255.255. Class B private
address range is 172.16.0.0 through 172.31.255.255, and Class C private address
range is 192.168.0.0 through 192.168.255.255.
20. Which of the following is class C IP Address?
A. 192.168.1.2 255.255.255.0
B. 172.168.0.0 255.255.0.0
C. 10.0.0.0 255.0.0.0
D. None

Answer: A
21. Which of the following is localhost IP?
A. 172.169.1.2
B. 192.168.2.3
C. 127.0.0.1
D. All
Answer: C

Part II: - Define

1. What is DBMS?

Answer: - Database Management System is a collection of programs for managing


data. It is system software which enables the storage, modification, manipulation, and
extraction of data from a database.
It supports the varied users to CREATE, MANAGE, RETRIEVE, UPDATE, and STORE
the information.
2. What are the three types of SQL statement? List and explain them.
Answer: - 1) DDL (Data Definition Language): It is used to define the database
structure such as tables. It includes three statements such as Create, Alter, and Drop.
2) DML (Data Manipulation Language): These statements are used to manipulate the data in
records. Commonly used DML statements are Insert, Update, and Delete.
The Select statement is used as partial DML statement that is used to select all or relevant
records in the table.
3) DCL (Data Control Language): These statements are used to set privileges such as Grant
and Revoke database access permission to the specific user.

3. List some of database applications.

Answer: - Some of the popular database applications are: Oracle, Sybase, MS Access, MS SQL Server,
Paradox, DB/2, Dbase, FoxPro, MySql

4. What are the elements of a database?


Answer: - The major elements of a database are
Tables, Queries, Form, Reports, Macros, Modules
5. What are the responsibilities of Database Administrator?

Answer: - System / Application installation.


 Designs and documents database architecture
 Develops database utilities and automated reporting.
 Creates, tests, and executes data management languages
 Performs maintenance operations daily, weekly and monthly
 Implements and maintains database security and encryption
 Develops, manages and tests database and information system backup and recovery
plans.
 Database recovery in case of crash
 Identify staff’s problems and resolve it.
 Monitors all database resources.
 Update software, hardware and services.

6. What is the difference between HTTPS and HTTP?


Answer:-
HTTPS:-
Hyper Text Transfer Protocol Secured.
While there is some encryption capability of HTTPS, it is usually deemed not enough
and further encryption methods are desired whenever possible. HTTPS traffic goes over
TCP port 443.
HTTP:- Hyper Text Transfer Protocol
It not use encryption method
Its traffic goes over TCP port 80

7. What is the difference between UTP cable and STP cable?


STP: - shielded Twisted Pair cable
The main purpose of STP is to prevent crosstalk. Crosstalk is electromagnetic
interferences or noise that can affect data being transmitted across cables.
UTP:-Unshielded Twisted Pair cable
There is cross talk on it.

8. What is a MAC address?

MAC, or Media Access Control, uniquely identifies a device on the network. It is also known as
physical address or Ethernet address. A MAC address is made up of 6-byte parts.

9. What is DHCP?

DHCP is short for Dynamic Host Configuration Protocol. Its main task is to automatically
assign an IP address to devices across the network. It first checks for the next available address
not yet taken by any device, then assigns this to a network device.

10. What is DNS?

DNS is Domain Name System. The main function of this network service is to provide host
names to TCP/IP address resolution.

You might also like